— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
Abstract--Virtualization technology facilitates a dynamic, demanddriven allocation and migration of servers. This paper studies how the flexibility offered by network virtualizatio...
Dushyant Arora, Anja Feldmann, Gregor Schaffrath, ...
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Abstract—With the increasing deployment of wireless technologies, such as WLAN, HSDPA, and WiMAX, it is often the case that simultaneous coverage of several access networks is av...
Dominik Kaspar, Kristian Evensen, Audun Fosselie H...