Sciweavers

1748 search results - page 169 / 350
» Security Models for Heterogeneous Networking
Sort
View
ESORICS
2007
Springer
15 years 10 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
117
Voted
AI
2010
Springer
15 years 7 months ago
Automatic Discovery of Network Applications: A Hybrid Approach
Automatic discovery of network applications is a very challenging task which has received a lot of attentions due to its importance in many areas such as network security, QoS prov...
Mahbod Tavallaee, Wei Lu, Ebrahim Bagheri, Ali A. ...
152
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Hierarchical Provisioning Algorithm for Virtual Private Networks Using the Hose Model
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. Two models were proposed for the service provisioning i...
Monia Ghobadi, Sudhakar Ganti, Gholamali C. Shoja
118
Voted
OTM
2005
Springer
15 years 9 months ago
Peer-to-Peer Distribution Architectures Providing Uniform Download Rates
Peer-to-peer (P2P) networks have proved to be a powerful and highly scalable alternative to traditional client-server architectures for content distribution. They offer the techni...
Marc Schiely, Pascal Felber
INFOCOM
2007
IEEE
15 years 10 months ago
Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have have bought to the forefront the seriousness of the security threat to this increasingly popular...
Krishna K. Ramachandran, Biplab Sikdar