Sciweavers

2213 search results - page 312 / 443
» Software Security
Sort
View
118
Voted
CLUSTER
2007
IEEE
15 years 3 months ago
Meta-communications in component-based communication frameworks for grids
— Applications are faced with several network-related problems on current grids: heterogeneous networks, firewalls, NAT, private IP addresses, non-routed networks, performance p...
Alexandre Denis
144
Voted
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
15 years 10 months ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...
109
Voted
GLOBECOM
2007
IEEE
15 years 9 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
ANCS
2005
ACM
15 years 9 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna
140
Voted
FTDCS
2003
IEEE
15 years 8 months ago
Situation-Aware Contract Specification Language for Middleware for Ubiquitous Computing
Ubicomp applications are characterized as situationaware, frequently-and-ephemerally-communicated and QoS-properties-associated. Using middleware to provide multiple QoS support f...
Stephen S. Yau, Yu Wang, Dazhi Huang, Hoh Peter In