Sciweavers

1748 search results - page 245 / 350
» Security Models for Heterogeneous Networking
Sort
View
128
Voted
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
16 years 20 days ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
112
Voted
ICCSA
2005
Springer
15 years 9 months ago
Data Protection Based on Physical Separation: Concepts and Application Scenarios
Data protection is an increasingly important issue in today’s communication networks. Traditional solutions for protecting data when transferred over a network are almost exclusi...
Stefan Lindskog, Karl-Johan Grinnemo, Anna Brunstr...
236
Voted
CSE
2011
IEEE
14 years 3 months ago
Performance Enhancement of Network Devices with Multi-Core Processors
— In network based applications, packet capture is the main area that attracts many researchers in developing traffic monitoring systems. Along with the packet capture, many othe...
Nhat-Phuong Tran, Sugwon Hong, Myungho Lee, Seung-...
140
Voted
ISCC
2003
IEEE
180views Communications» more  ISCC 2003»
15 years 8 months ago
Wireless Application Protocol Transport Layer Performance
: In this paper, simulation-based performance evaluation of the Wireless Application Protocol (WAP) Transport Lay er Protocol, which may be suitable for Combat Net Radio (CNR), is ...
Gökhan Kahraman, Semih Bilgen
153
Voted
MOBIWAC
2006
ACM
15 years 9 months ago
Calibration-free WLAN location system based on dynamic mapping of signal strength
In this work we present a calibration-free system for locating wireless local area network devices, based on the radio frequency characteristics of such networks. Calibration proc...
Luís Felipe M. de Moraes, Bruno Astuto A. N...