Sciweavers

1737 search results - page 164 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
TWC
2008
245views more  TWC 2008»
15 years 4 months ago
Cross-Layer Optimal Policies for Spatial Diversity Relaying in Mobile Ad Hoc Networks
In order to adapt to time-varying wireless channels, various channel-adaptive schemes have been proposed to exploit inherent spatial diversity in mobile/wireless ad hoc networks w...
Jing Ai, Alhussein A. Abouzeid, Zhenzhen Ye
129
Voted
IM
2003
15 years 6 months ago
A Dynamic SNMP to XML Proxy Solution
: The network management area has some proposals to use XML to encode information models and managed object instances. In this paper we present a solution to dynamically create SNM...
Ricardo Neisse, Lisandro Zambenedetti Granville, D...
170
Voted
PET
2007
Springer
15 years 11 months ago
Browser-Based Attacks on Tor
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
ACSAC
2004
IEEE
15 years 8 months ago
Worm Detection, Early Warning and Response Based on Local Victim Information
Worm detection systems have traditionally focused on global strategies. In the absence of a global worm detection system, we examine the effectiveness of local worm detection and ...
Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David D...
ITCC
2003
IEEE
15 years 10 months ago
Analysis and regeneration of hypermedia contents through Java and XML tools
This paper presents a tool, for the analysis and regeneration of web contents, implemented through XML and Java. At the moment, the web content delivery from server to clients is ...
David Mérida, Ramón Fabregat, Anna U...