Sciweavers

12568 search results - page 2253 / 2514
» Selective user interaction
Sort
View
ICC
2008
IEEE
164views Communications» more  ICC 2008»
15 years 11 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
ICC
2008
IEEE
112views Communications» more  ICC 2008»
15 years 11 months ago
Weighted Fair Uplink/Downlink Access Provisioning in IEEE 802.11e WLANs
— We present the unfairness problem between the uplink and the downlink flows in the IEEE 802.11e infrastructure Basic Service Set (BSS) when the default settings of the Enhance...
Feyza Keceli, Inanc Inan, Ender Ayanoglu
151
Voted
ICPADS
2008
IEEE
15 years 11 months ago
Towards Benchmarking of Structured Peer-to-Peer Overlays for Network Virtual Environments
Network virtual environments (NVE) are an evolving trend combining millions of users in an interactive community. A distributed NVE platform promises to lower the administration c...
Aleksandra Kovacevic, Kalman Graffi, Sebastian Kau...
ICST
2008
IEEE
15 years 11 months ago
State-Based Testing of Ajax Web Applications
Ajax supports the development of rich-client Web applications, by providing primitives for the execution of asynchronous requests and for the dynamic update of the page structure ...
Alessandro Marchetto, Paolo Tonella, Filippo Ricca
125
Voted
IEEEARES
2008
IEEE
15 years 11 months ago
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks
The ubiquity of web applications has led to an increased focus on the development of attacks targeting these applications. One particular type of attack that has recently become p...
Mehdi Kiani, Andrew Clark, George M. Mohay
« Prev « First page 2253 / 2514 Last » Next »