Sciweavers

1748 search results - page 131 / 350
» Security Models for Heterogeneous Networking
Sort
View
131
Voted
WORM
2003
15 years 5 months ago
Worm anatomy and model
We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of ...
Dan Ellis
109
Voted
AINA
2006
IEEE
15 years 7 months ago
Refining WiFi Indoor Positioning Renders Pertinent Deploying Location-Based Multimedia Guide
If outdoor positioning is widely treated and quite precise, indoor or more generally in heterogeneous environment, the positioning (and also mobility prediction) requires conseque...
Frederic Lassabe, Philippe Canalda, Pascal Chatonn...
131
Voted
WMASH
2004
ACM
15 years 9 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
128
Voted
CSREASAM
2006
15 years 5 months ago
Developing Dual-Surveillance Based Vehicle Security Management with Generalized Honeycomb Tori
After the 9/11 event, terrorist attacks related to vehicles cannot be overlooked. In some critical areas, security should be concerned from the context of streets or vehicle moveme...
Li-Yen Hsu, Shin-Shin Kao
121
Voted
NETWORKING
2004
15 years 5 months ago
Performance Modelling and Evaluation of Firewall Architectures for Multimedia Applications
Firewalls are a well-established security mechanism to restrict the traffic exchanged between networks to a certain subset of users and applications. In order to cope with new appl...
Utz Roedig, Jens Schmitt