Sciweavers

1737 search results - page 84 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
WISEC
2009
ACM
15 years 6 months ago
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
Recent studies show that network coding can provide significant benefits to network protocols, such as increased throughput, reduced network congestion, higher reliability, and ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
SAC
2009
ACM
15 years 6 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
IEEEARES
2006
IEEE
15 years 6 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
CORR
2011
Springer
221views Education» more  CORR 2011»
14 years 6 months ago
Course on System Design (structural approach)
—The article describes a course on system design (structural approach) which involves the following: issues of systems engineering; structural models; basic technological problem...
Mark Sh. Levin
IADIS
2003
15 years 1 months ago
A Strategic Analysis of M-Commerce in the United States
The purpose of this paper is to provide some understanding on the key forces impacting on the successful evolvement of m-commerce in the US market from Mobile Network Operators’...
Eun-A Park