Sciweavers

730 search results - page 102 / 146
» Reflections on network architecture: an active networking pe...
Sort
View
CN
2007
179views more  CN 2007»
14 years 11 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
MOBIWAC
2009
ACM
15 years 6 months ago
The sociable traveller: human travelling patterns in social-based mobility
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Chiara Boldrini, Marco Conti, Andrea Passarella
TRIDENTCOM
2010
IEEE
14 years 9 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
IAW
2003
IEEE
15 years 5 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
NOSSDAV
2011
Springer
14 years 2 months ago
A measurement study of resource utilization in internet mobile streaming
The pervasive usage of mobile devices and wireless networking support have enabled more and more Internet streaming services to all kinds of heterogeneous mobile devices. However,...
Yao Liu, Fei Li, Lei Guo, Songqing Chen