咨询与建议

限定检索结果

文献类型

  • 65 篇 会议

馆藏范围

  • 65 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39 篇 工学
    • 38 篇 计算机科学与技术...
    • 31 篇 信息与通信工程
    • 12 篇 电气工程
    • 5 篇 生物医学工程(可授...
    • 3 篇 软件工程
    • 2 篇 网络空间安全
  • 7 篇 管理学
    • 7 篇 管理科学与工程(可...
  • 5 篇 理学
    • 5 篇 物理学
    • 5 篇 生物学
  • 5 篇 医学
    • 5 篇 临床医学
    • 5 篇 特种医学

主题

  • 11 篇 ieee 802.11 stan...
  • 8 篇 quality of servi...
  • 7 篇 throughput
  • 6 篇 wireless communi...
  • 6 篇 wireless lan
  • 5 篇 bandwidth
  • 5 篇 mobile communica...
  • 4 篇 local area netwo...
  • 4 篇 delay
  • 4 篇 wireless network...
  • 3 篇 routing
  • 3 篇 wimax
  • 3 篇 wireless sensor ...
  • 3 篇 algorithm design...
  • 3 篇 topology
  • 3 篇 wireless local a...
  • 3 篇 telecommunicatio...
  • 2 篇 relays
  • 2 篇 application soft...
  • 2 篇 authentication

机构

  • 2 篇 department of in...
  • 1 篇 computer science...
  • 1 篇 department of el...
  • 1 篇 tech univ claust...
  • 1 篇 univ ontario ins...
  • 1 篇 department of el...
  • 1 篇 berddal univ.
  • 1 篇 deutsche telekom...
  • 1 篇 university of ot...
  • 1 篇 mit lids 77 mass...
  • 1 篇 suny stony brook...
  • 1 篇 pusan natl univ ...
  • 1 篇 york univ dept c...
  • 1 篇 halmstad univ ce...
  • 1 篇 zhejiang gongsha...
  • 1 篇 univ roma la sap...
  • 1 篇 department of el...
  • 1 篇 zhejiang univ pe...
  • 1 篇 arl adelphi md 2...
  • 1 篇 department of el...

作者

  • 2 篇 hyuk lim
  • 1 篇 sofia rute
  • 1 篇 lakshmi santhana...
  • 1 篇 lin xiaodong
  • 1 篇 a. vina
  • 1 篇 abdel-hamid y.
  • 1 篇 veitch darryl
  • 1 篇 t. tuglular
  • 1 篇 george alan
  • 1 篇 shi qingjiang
  • 1 篇 shi zhiguo
  • 1 篇 eunho yang
  • 1 篇 swami a.
  • 1 篇 y. abdel-hamid
  • 1 篇 ming lai
  • 1 篇 a. mana
  • 1 篇 atkinson j. s.
  • 1 篇 zuniga marco
  • 1 篇 j.j. ortega
  • 1 篇 jayasumana anura...

语言

  • 65 篇 英文
检索条件"任意字段=33rd IEEE Conference on Local Computer Networks, LCN 2008"
65 条 记 录,以下是61-70 订阅
排序:
Your WiFi Is Leaking: Ignoring Encryption, Using Histograms to Remotely Detect Skype Traffic  33
Your WiFi Is Leaking: Ignoring Encryption, Using Histograms ...
收藏 引用
33rd Annual ieee Military Communications conference on Affordable Mission Success - Meeting the Challenge (MILCOM)
作者: Atkinson, J. S. Rio, M. Mitchell, J. E. Matich, G. UCL London England SELEX ES Basildon Essex England
This paper presents a remote, undetectable, high accuracy mechanism to infer Skype voice traffic on WiFi networks with a success rate of similar or equal to 97% and only a similar or equal to 3% false positive rate. I... 详细信息
来源: 评论
Cross-Layer Path Management in Multi-path Transport Protocol for Mobile Devices
Cross-Layer Path Management in Multi-path Transport Protocol...
收藏 引用
33rd ieee Annual conference on computer Communications (ieee INFOCOM)
作者: Lim, Yeon-sup Chen, Yung-Chih Nahum, Erich M. Towsley, Don Lee, Kang-Won Univ Massachusetts Amherst Sch Comp Sci Amherst MA 01003 USA IBM TJ Watson Res Ctr Yorktown Hts NY USA
MPTCP is a new transport protocol that enables mobile devices to use several physical paths simultaneously through multiple network interfaces, such as WiFi and cellular. However, wireless path characteristics change ... 详细信息
来源: 评论
GUI-Based Testing of Boundary Overflow Vulnerability
GUI-Based Testing of Boundary Overflow Vulnerability
收藏 引用
ieee Annual International computer Software and Applications conference (COMPSAC)
作者: T. Tuglular C. A. Muftuoglu O. Kaya F. Belli M. Linschulte Department of Computer Engineering Izmir Institute of Technology Urla Izmir Turkey Department of Computer Science Electrical Engineering and Mathematics University of Paderborn Germany
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of program, and can be provoked by an intruder to gain control of or access to stored data. In order to counterme... 详细信息
来源: 评论
An user authentication infrastructure for extranet applications
An user authentication infrastructure for extranet applicati...
收藏 引用
International Carnahan conference on Security Technology
作者: J. Lopez A. Mana J.J. Ortega Computer Science Department E.T.S. Ingeniería Informática University of Màlaga Malaga Spain
An extranet is used to connect businesses with their suppliers, customers or other businesses that share common goals in a way that automates their administrative interactions using Internet technology. The security o... 详细信息
来源: 评论
Detecting security vulnerabilities in remote TCP/IP networks: an approach using security scanners
Detecting security vulnerabilities in remote TCP/IP networks...
收藏 引用
International Carnahan conference on Security Technology
作者: J.L. Lerida S.M. Grackzy A. Vina J.M. Andujar Department of Electronics and Systems University of A Coruña Coruna Spain Department of Electronics Engineering Informatics Systems and Automatics Campus of La Rábida University of Huelva Huelva Spain
The objective of the paper is to carry out an analysis of tools used for performing external security audits. All the tools with the capacity to remotely detect vulnerabilities which are currently available in the mar... 详细信息
来源: 评论