IEEE Internet Computing

Results: 576



#Item
51Computing / Routing / Internet / Network topology / Routing protocols / Wireless sensor network / Link-state routing protocol / Network coding / Network architecture / Routing algorithms / Wireless networking

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 62, NO. 4, MAYGraph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2013-07-11 04:55:54
52Internet protocols / Routing protocols / Internet standards / Border Gateway Protocol / Networking hardware / Internet backbone / Router / Backbone / Routing / Internet / Network architecture / Computing

Poster: Resilience of the Internet: the Case of the BGP Backbone Sylvain Frey, Awais Rashid, Yehia Elkhatib, Karolina Follis, John Vidler, Nick Race, Chris Edwards Lancaster University {s.frey,a.rashid,y.elkhatib,k.folli

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:30
53Professional associations / Standards organizations / Computer network security / Security / Privacy / Internet privacy / Network security / Cloud computing / Institute of Electrical and Electronics Engineers / Ethics / International nongovernmental organizations / Human rights

Microsoft Word - ICCC-PSC_final

Add to Reading List

Source URL: www.ieee-iccc.org

Language: English - Date: 2015-02-06 01:08:02
54Cyberwarfare / Computer security / Denial-of-service attack / Internet Relay Chat / OpenFlow / Network security / Computer network / Tor / NTP server misuse and abuse / Denial-of-service attacks / Computer network security / Computing

Poster: Denial of Service Defence using Router Migration Jonathan Weekes, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:34
55Internet / Information retrieval / URL redirection / HTTP / Hash table / HTTP cookie / Redirection / Computing / Uniform resource locator / Information science

Poster:An Efficient and Scalable Cyberlocker Traffic Tracking Method Chao Zheng1,2,3), Peng Zhang1,2), Shu Li1,2) , Jianlong Tan1,2),Qingyun Liu1,2,3) 1 Institute of Information Engineering, Chinese Academy of Sciences,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:20
56Peer-to-peer / Internet privacy / Scalability / Database / Secure multi-party computation / Boolean circuit / Theoretical computer science / Computing / Applied mathematics

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceedings. Privacy Preserving Group Nearest Neighbour Queries in

Add to Reading List

Source URL: www.cse.unt.edu

Language: English - Date: 2013-08-12 14:35:10
57Cross-platform software / Freenet / Bitcoin / Plausible deniability / Peer-to-peer / Internet / Document / Software / Computing / Information technology audit

Poster: Incentivized Censorship Resistance with Payment Contracts Cecylia Bocovich, John A. Doucette, Ian Goldberg University of Waterloo, School of Computer Science {cbocovic, j3doucet, iang}@uwaterloo.ca Waterloo, Onta

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:31
58Telecommunications engineering / Computing / Network architecture / Network protocols / Delay-tolerant networking / Interplanetary Internet / IEEE 802.11 / Wireless mesh network / Wireless network interface controller / Network performance / Technology / Wireless networking

LNCSAchieving Energy-Efficiency with DTN: A Proof-of-Concept and Roadmap Study

Add to Reading List

Source URL: www.spice-center.org

Language: English - Date: 2012-12-19 05:32:15
59Computing / Phishing / Social engineering / Email / Computer-mediated communication / Verb / Gmail / Spamming / Internet / Computer crimes

Poster: Syntactic Element Similarity for Phishing Detection Gilchan Park Julia M. Taylor

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:27
60Routing protocols / Internet protocols / Internet standards / Routing / Open Shortest Path First / Price of anarchy / Network topology / Border Gateway Protocol / Router / Network architecture / Internet / Computing

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. X, APRILOn Selfish Routing in Internet-Like Environments Lili Qiu, Member, IEEE, Yang Richard Yang, Member, IEEE, Yin Zhang, Member, IEEE,

Add to Reading List

Source URL: www-net.cs.yale.edu

Language: English - Date: 2004-05-03 17:02:12
UPDATE