Sciweavers

2047 search results - page 288 / 410
» Pervasive Computing on Active Networks
Sort
View
ICPADS
2005
IEEE
15 years 10 months ago
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access
In the audit process of Internet activities of users in a local area network, one of the most difficult problems is the problem of source authentication i.e. establishing securely...
Yusuf Uzunay, Kemal Bicakci
EUC
2005
Springer
15 years 10 months ago
Object Tracking Using Durative Events
This paper presents a distributed middleware architecture based on a service-oriented approach, to manage high volume sensor events. Event management takes a multi-step operation f...
Eiko Yoneki, Jean Bacon
129
Voted
SIGCOMM
2009
ACM
15 years 11 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
140
Voted
NSPW
2003
ACM
15 years 9 months ago
Locality: a new paradigm for thinking about normal behavior and outsider threat
Locality as a unifying concept for understanding the normal behavior of benign users of computer systems is suggested as a unifying paradigm that will support the detection of mal...
John McHugh, Carrie Gates
WWW
2004
ACM
16 years 5 months ago
Educanext: a framework for sharing live educational resources with isabel
EducaNext is an educational mediator created within the UNIVERSAL IST Project which supports both, the exchange of reusable educational materials based on open standards, as well ...
Juan Quemada, Gabriel Huecas, Tomás de Migu...