Sciweavers

14824 search results - page 2533 / 2965
» Security - Introduction
Sort
View
SIES
2007
IEEE
15 years 10 months ago
Architecture and Implementation of an Embedded Wormhole
Abstract— Recent advances in wireless communication technology have opened the way for mobile services and applications. This paper describes ongoing work in the context of the H...
Hugo Ortiz, Antonio Casimiro, Paulo Veríssi...
SRDS
2007
IEEE
15 years 10 months ago
A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations
The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, ha...
Laurent Burgy, Laurent Réveillère, J...
WETICE
2007
IEEE
15 years 10 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan
INFOCOM
2007
IEEE
15 years 10 months ago
Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have have bought to the forefront the seriousness of the security threat to this increasingly popular...
Krishna K. Ramachandran, Biplab Sikdar
ACCV
2007
Springer
15 years 10 months ago
Task Scheduling in Large Camera Networks
Camera networks are increasingly being deployed for security. In most of these camera networks, video sequences are captured, transmitted and archived continuously from all cameras...
Ser-Nam Lim, Larry S. Davis, Anurag Mittal
« Prev « First page 2533 / 2965 Last » Next »