Sciweavers

425 search results - page 34 / 85
» The ENTRAPID Protocol Development Environment
Sort
View
108
Voted
JDCTA
2010
172views more  JDCTA 2010»
14 years 10 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
107
Voted
NDSS
2007
IEEE
15 years 9 months ago
Generic Application-Level Protocol Analyzer and its Language
Application-level protocol analyzers are important components in tools such as intrusion detection systems, firewalls, and network monitors. Currently, protocol analyzers are wri...
Nikita Borisov, David Brumley, Helen J. Wang, John...
AI
2008
Springer
15 years 3 months ago
Robust artificial life via artificial programmed death
We propose a novel approach to self-regenerating continuously-operating systems. Such systems provide best-case solutions in security surveillance or decision making centers. We i...
M. M. Olsen, N. Siegelmann-Danieli, Hava T. Siegel...
136
Voted
ARESEC
2011
119views more  ARESEC 2011»
14 years 3 months ago
Some Security Issues in SCALANCE Wireless Industrial Networks
—We discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network ...
Marius Cristea, Bogdan Groza, Mihai Iacob
114
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Reliable Wireless Broadcasting with Near-Zero Feedback
We examine the problem of minimizing feedbacks in reliable wireless broadcasting, by pairing rateless coding with extreme value theory. Our key observation is that, in a broadcast ...
Weiyao Xiao, Sachin Agarwal, David Starobinski, Ar...