Search Results
2. An Adversarial Evaluation of Network Signaling and Control Mechanisms
3. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
4. A2M: Access-Assured Mobile Desktop Computing
5. Adding Trust to P2P Distribution of Paid Content
6. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks
7. Evaluating a Collaborative Defense Architecture for MANETs
8. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors
9. Identifying Proxy Nodes in a Tor Anonymization Circuit
10. Pushback for Overlay Networks: Protecting Against Malicious Insiders
- « Previous
- Next »
- 1
- 2
- 3