Sciweavers

14824 search results - page 2578 / 2965
» Security - Introduction
Sort
View
HT
2005
ACM
15 years 9 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
IMC
2005
ACM
15 years 9 months ago
Inferring and Debugging Path MTU Discovery Failures
If a host can send packets larger than an Internet path can forward, it relies on the timely delivery of Internet Control Message Protocol (ICMP) messages advising that the packet...
Matthew J. Luckie, Kenjiro Cho, Bill Owens
MINENET
2005
ACM
15 years 9 months ago
Learning-based anomaly detection in BGP updates
Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet’s interdomain-routing system. In this paper, we propose an inst...
Jian Zhang, Jennifer Rexford, Joan Feigenbaum
MSWIM
2005
ACM
15 years 9 months ago
Balancing auditability and privacy in vehicular networks
We investigate how to obtain a balance between privacy and audit requirements in vehicular networks. Challenging the current trend of relying on asymmetric primitives within VANET...
Jong Youl Choi, Markus Jakobsson, Susanne Wetzel
128
Voted
MUM
2005
ACM
138views Multimedia» more  MUM 2005»
15 years 9 months ago
Group-based content push with dynamic session startup
This paper proposes an intelligent mobile middleware utilizing group-based content push with dynamic session startup and plugand-play features. Solution enhances the distribution ...
Otso Kassinen, Timo Koskela, Erkki Harjula, Jussi ...
« Prev « First page 2578 / 2965 Last » Next »