Sciweavers

1737 search results - page 153 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
GLOBECOM
2007
IEEE
15 years 11 months ago
Exit Policy Violations in Multi-Hop Overlay Routes: Analysis and Mitigation
— The traffic exchanged between two overlay nodes in different autonomous systems (AS) is always subjected to a series of inter-domain policies. However, overlay routing often m...
Srinivasan Seetharaman, Mostafa H. Ammar
151
Voted
CCS
2004
ACM
15 years 10 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
145
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 5 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
ADHOCNETS
2009
Springer
15 years 9 months ago
Power-Aware Intrusion Detection in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) are a highly promising new form of networking. However they are more vulnerable to attacks than wired networks. In addition, conventional intrusion ...
Sevil Sen, John A. Clark, Juan E. Tapiador
ICC
2007
IEEE
138views Communications» more  ICC 2007»
15 years 11 months ago
An Analytical Model for Energy Efficiency of Error Control Schemes in Sensor Networks
- This paper analyzes the energy efficiency of wireless sensor networks using different error control schemes. An analytical model is presented to evaluate the energy efficiency in...
João H. Kleinschmidt, Walter C. Borelli, Ma...