Sciweavers

1748 search results - page 97 / 350
» Security Models for Heterogeneous Networking
Sort
View
146
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
A Queueing Network Model of an Edge Optical Burst Switching Node
— We consider an edge optical burst switching (OBS) node with or without converters, and with no buffering. The OBS node serves a number of users, each connected to the switch ov...
Lisong Xu, Harry G. Perros, George N. Rouskas
104
Voted
ESORICS
2010
Springer
15 years 4 months ago
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the...
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven...
95
Voted
NIPS
2003
15 years 4 months ago
A Recurrent Model of Orientation Maps with Simple and Complex Cells
We describe a neuromorphic chip that utilizes transistor heterogeneity, introduced by the fabrication process, to generate orientation maps similar to those imaged in vivo. Our mo...
Paul Merolla, Kwabena Boahen
106
Voted
JSW
2007
116views more  JSW 2007»
15 years 3 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...
121
Voted
CCS
2007
ACM
15 years 9 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...