Sciweavers

1630 search results - page 255 / 326
» Secure Overlay Network Design
Sort
View
JDCTA
2010
143views more  JDCTA 2010»
14 years 4 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
ICDCS
2008
IEEE
15 years 4 months ago
Fast Path Session Creation on Network Processors
The security gateways today are required not only to block unauthorized accesses by authenticating packet headers, but also by inspecting connection states to defend against malic...
Bo Xu, Yaxuan Qi, Fei He, Zongwei Zhou, Yibo Xue, ...
IAT
2007
IEEE
15 years 4 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
IIWAS
2008
14 years 11 months ago
Supporting mobile payment QOS by data mining GSM network traffic
In mobile commerce, short-message-service (SMS) is an important technique for delivering payment instruction. A payment model "SMS Credit" was proposed earlier [1]. Such...
Edison Lai, Simon Fong, Yang Hang
CACM
2000
158views more  CACM 2000»
14 years 9 months ago
Wireless Integrated Network Sensors
Wireless Integrated Network Sensors (WINS) now provide a new monitoring and control capability for transportation, manufacturing, health care, environmental monitoring, and safety...
Gregory J. Pottie, William J. Kaiser