Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Carl Livadas"'
Autor:
Paul Rubel, Gary J. Minden, Vikas Kawadia, Karen Zita Haigh, David Lapsley, Craig Partridge, Eric Blossom, Gregory Donald Troxel, Vivek Raghunathan, Dan Sumorok, Alex Colvin, Steve Boswell, Alberto Medina, Tad Dreier, Alexander M. Wyglinski, Cesar A. Santivanez, Talib S. Hussain, Mani Srivastava, Robert S. Vincent, Carl Livadas, Ram Ramanathan, Nick Goffee, Thomas Schmid, Sadaf Zahedi, David P. Wiggins, Armando Caro, Robert Morris, Joseph B. Evans, Isidro Marcos Castineyra, Joanne Mikkelson
Publikováno v:
Computer Networks. 52:898-911
Software-defined radios (SDRs) are now recognized as a key building block for future wireless communications. We have spent the past year enhancing existing open software to create a software-defined data radio. This radio extends the notion of softw
Publikováno v:
Department of Computer Science Technical Reports
CSE (4)
CSE (4)
To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly increase the ability to defend against attack, this comes at the cost of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::71ce204dae4f1a87ca4ee9305483a9ef
https://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2719&context=cstech
https://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=2719&context=cstech
Autor:
Jaideep Chandrashekar, Steve Orrin, Carl Livadas, Joohwan Kim, Fadi El-Moussa, Prashant Gandhi, Gogobada Daa Dabibi, Pablo R. Passera, Eve M. Schooler, Martin Koyabe
Publikováno v:
TRIDENTCOM
Network defense is an elusive art. The arsenal to defend our devices from attack is constantly lagging behind the latest methods used by attackers to break into them and subsequently into our networks. To counteract this trend, we developed a distrib
Publikováno v:
Botnet Detection ISBN: 9780387687667
Botnet Detection
Botnet Detection
Current techniques for detecting botnets examine traffic content for IRC commands, monitor DNS for strange usage, or set up honeynets to capture live bots. Our botnet detection approach is to examine flow characteristics such as bandwidth, packet tim
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::395f13190e0c4c53972bf5917c251323
https://doi.org/10.1007/978-0-387-68768-1_1
https://doi.org/10.1007/978-0-387-68768-1_1