Sciweavers

6122 search results - page 1133 / 1225
» Securing network access in wireless sensor networks
Sort
View
MOBICOM
2010
ACM
14 years 10 months ago
Fair WLAN backhaul aggregation
Aggregating multiple 802.11 Access Point (AP) backhauls using a single-radio WLAN card has been considered as a way of bypassing the backhaul capacity limit. However, current AP a...
Domenico Giustiniano, Eduard Goma Llairo, Alberto ...
JCM
2006
126views more  JCM 2006»
14 years 10 months ago
A Multicast Transport Protocol Design Methodology: Analysis, Implementation and Performance Evaluation
In this paper, we propose and analyze a multicast application called SOMA (SynchrOnous Multicast Application) which offers multicast file transfer service in an asymmetric intra-ca...
Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnou...
RAID
2010
Springer
14 years 8 months ago
Automatic Discovery of Parasitic Malware
Malicious software includes functionality designed to block discovery or analysis by defensive utilities. To prevent correct attribution of undesirable behaviors to the malware, it...
Abhinav Srivastava, Jonathon T. Giffin
SUTC
2006
IEEE
15 years 3 months ago
Multi-ontology Based Multimedia Annotation for Domain-specific Information Retrieval
Recent advances in computer power, network bandwidth, information storage, and multimedia/signal processing techniques have led to a proliferation of multimedia data. As a result,...
Aijuan Dong, Honglin Li
CCS
2009
ACM
15 years 10 months ago
Automating analysis of large-scale botnet probing events
Botnets dominate today's attack landscape. In this work we investigate ways to analyze collections of malicious probing traffic in order to understand the significance of lar...
Zhichun Li, Anup Goyal, Yan Chen, Vern Paxson
« Prev « First page 1133 / 1225 Last » Next »