Sciweavers

1748 search results - page 99 / 350
» Security Models for Heterogeneous Networking
Sort
View
FSKD
2006
Springer
106views Fuzzy Logic» more  FSKD 2006»
15 years 7 months ago
Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
Chengchen Hu, Zhen Liu, Zhen Chen, Bin Liu
131
Voted
TON
2008
102views more  TON 2008»
15 years 3 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
131
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the...
Cas J. F. Cremers
133
Voted
PERCOM
2007
ACM
16 years 3 months ago
The Role of Probabilistic Schemes in Multisensor Context-Awareness
This paper investigates the role of existing "probabilistic" schemes to reason about various everyday situations on the basis of data from multiple heterogeneous physical...
Waltenegus Dargie
136
Voted
MSWIM
2005
ACM
15 years 9 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....