Sciweavers

6907 search results - page 1143 / 1382
» Securing distributed adaptation
Sort
View
LCN
2006
IEEE
15 years 5 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
NDSS
2006
IEEE
15 years 5 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
77
Voted
ML
2006
ACM
15 years 5 months ago
ML grid programming with ConCert
Grid computing has become increasingly popular with the growth of the Internet, especially in large-scale scientific computation. Computational Grids are characterized by their s...
Tom Murphy VII
SASN
2006
ACM
15 years 5 months ago
Inverting sensor networks and actuating the environment for spatio-temporal access control
Wireless sensor networks are typically deployed to measure the information field, rather than create an information field. However, by utilizing the radio on sensor nodes, it is...
Shu Chen, Yu Zhang, Wade Trappe
88
Voted
VALUETOOLS
2006
ACM
141views Hardware» more  VALUETOOLS 2006»
15 years 5 months ago
A realistic simulation of internet-scale events
Internet-scale security incidents are becoming increasingly common, and the researchers need tools to replicate and study them in a controlled setting. Current network simulators,...
Songjie Wei, Jelena Mirkovic
« Prev « First page 1143 / 1382 Last » Next »