Sciweavers

194 search results - page 29 / 39
» Wireless Intrusion Detection and Response
Sort
View
CN
2004
98views more  CN 2004»
14 years 9 months ago
Considering spurious timeout in proxy for improving TCP performance in wireless networks
In this paper, we introduce a new proxy that effectively prevents unnecessary retransmissions of Transmission Control Protocol data segments from flowing over a wireless link on a...
Yu-Chul Kim, Dong-Ho Cho
CORR
2010
Springer
109views Education» more  CORR 2010»
14 years 9 months ago
Experimenting with Innate Immunity
libtissue is a software system for implementing and testing AIS algorithms on real-world computer security problems. AIS algorithms are implemented as a collection of cells, antig...
Jamie Twycross, Uwe Aickelin
94
Voted
ANCS
2009
ACM
14 years 7 months ago
A NFA-based programmable regular expression match engine
Pattern matching is the most computation intensive task of a network intrusion detection system (NIDS). In this paper we present a hardware architecture to speed up the pattern mat...
Derek Pao
ICPR
2010
IEEE
15 years 1 months ago
Boolean Combination of Classifiers in the ROC Space
Using Boolean AND and OR functions to combine the responses of multiple one- or two-class classifiers in the ROC space may significantly improve performance of a detection system o...
Wael Khreich, Eric Granger, Ali Miri, R. Sabourin
TMC
2010
179views more  TMC 2010»
14 years 7 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera