Sciweavers

194 search results - page 29 / 39
» Wireless Intrusion Detection and Response
Sort
View
86
Voted
CN
2004
98views more  CN 2004»
14 years 11 months ago
Considering spurious timeout in proxy for improving TCP performance in wireless networks
In this paper, we introduce a new proxy that effectively prevents unnecessary retransmissions of Transmission Control Protocol data segments from flowing over a wireless link on a...
Yu-Chul Kim, Dong-Ho Cho
CORR
2010
Springer
109views Education» more  CORR 2010»
14 years 12 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
ANCS
2009
ACM
14 years 9 months ago
A NFA-based programmable regular expression match engine
Pattern matching is the most computation intensive task of a network intrusion detection system (NIDS). In this paper we present a hardware architecture to speed up the pattern mat...
Derek Pao
ICPR
2010
IEEE
15 years 4 months ago
Boolean Combination of Classifiers in the ROC Space
Using Boolean AND and OR functions to combine the responses of multiple one- or two-class classifiers in the ROC space may significantly improve performance of a detection system o...
Wael Khreich, Eric Granger, Ali Miri, R. Sabourin
TMC
2010
179views more  TMC 2010»
14 years 10 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera