SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "L773:0780393139 "

Search: L773:0780393139

  • Result 1-3 of 3
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Andersson, Christer, et al. (author)
  • Trust in PRIME
  • 2005
  • In: Proceedings of the 5<sup>th </sup>IEEE International Symposium on Signal Processing and IT. - : IEEE conference proceedings. - 0780393139 ; , s. 552-559
  • Conference paper (other academic/artistic)abstract
    • The PRIME project develops privacy enhancing identity management systems that allow users in various application areas such as e-commerce to regain control over their personal spheres. This paper introduces the PRIME technical architecture that also includes special trust-enhancing mechanisms, and shows how PRIME technologies can enhance privacy and trust of e-shopping customers. It also discusses the socio-psychological factors and HCI aspects influencing the end user's trust in privacy enhancing identity management, and shows why HCI research, user studies, and socio-psychological research, are necessary efforts to accompany system design.
  •  
2.
  • Hagsand, Olof, et al. (author)
  • Design and implementation of a distributed router
  • 2005
  • In: 2005 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Vols 1 and 2. - 0780393139 ; , s. 227-232
  • Conference paper (peer-reviewed)abstract
    • The requirements on 1P routers are increasing for every new generation of designs. The driving forces are growing traffic volumes and demands for new services. We argue that a decentralized modular system design would improve the scalability. flexibility, and reliability of future routers. We have designed and implemented such a distributed router. based on physical separation between different junctional modules for control and forwarding plane operations. This paper presents the design and implementation, focusing on the internal communication protocols and implementation aspects of the control plane.
  •  
3.
  • Mitrokotsa, Aikaterini, 1978, et al. (author)
  • Detecting denial of service attacks using emergent self-organizing maps
  • 2005
  • In: 5th IEEE International Symposium on Signal Processing & Information Technology. - 0780393139 ; , s. 375 - 380
  • Conference paper (peer-reviewed)abstract
    • Denial of service attacks constitute one of the greatest problem in network security. Monitoring traffic is one of the main techniques used in order to find out the existence of possible outliers in the traffic patterns. In this paper, we propose an approach that detects denial of service attacks using emergent self-organizing maps. The approach is based on classifying "normal" traffic against "abnormal" traffic in the sense of denial of service attacks. The approach permits the automatic classification of events that are contained in logs and visualization of network traffic. Extensive simulations show the effectiveness of this approach compared to previously proposed approaches regarding false alarms and detection probabilities
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-3 of 3

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view