The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Along with recent Internet security threats, different security measures have emerged. Whilst these security schemes ensure a level of protection against such threats, they sometimes have significant impact on perceived Quality of Service (QoS). There is thus need to retrieve ways for an efficient integration of security requirements with their QoS counterparts. In this paper, we devise a Quality...
This paper proposes the inclusion of two traffic forecasting frameworks in traffic sampling paradigm. The proposed frameworks: namely, the pattern forecasting and the attack forecasting, predicts the occurrence of traffic deviation and examines the existence of malicious attack in the traffic deviation, respectively. While the former utilizes the ARAR model to forecast the network traffic, the latter...
We propose a reduced-complexity genetic algorithm for intrusion detection of resource constrained multi-hop mobile sensor networks. Traditional intrusion detection mechanisms have limited applicability to the sensor networks due to scarce battery and processing resources. Therefore, an effective scheme would require a power efficient and lightweight approach to identify malicious attacks. The goal...
Disparate customer support centers in an enterprise system apply different monitoring and analysis tools while attempting to ensure quality of service for the end-user. These tools provide inconsistent metrics that make problem resolution inefficient and reactive rather than proactive and effective. A systems engineering approach is proposed that considers enterprise monitoring and analysis in high-speed...
Wireless sensor networks have become a technology for the new millennium with the endless possibilities for applications ranging from academic to military. These tiny sensors are deployed in open environments, where security for data or hardware cannot be guaranteed. Unfortunately due to the resource constraints, traditional security schemes cannot be applied. Therefore designing protocols that can...
We present an architecture for self-configuration of network entities for QoS and Security, based on the health of the network. In the architecture, we firstly present a novel data collection mechanism that integrates various network inputs such as flow data, packet data and SNMP values. Secondly we present our analysis of these inputs based on QoS and Security aspects and discuss analysis mechanisms...
The deployment of unified communications in enterprises has become increasingly common in the past few years, but as organizations invest resources to ensure quality of service and meet delivery schedules, they often overlook security.
The transformational satellite communications system (TSAT) is the DoDpsilas next generation geosynchronous satellite communications constellation. The TSAT system features packet and circuit interfaces that support a wide variety of military missions by providing communication services to fixed ground, mobile ground, marine, and airborne terminals. These terminals access a variety of link rates and...
Mobile Ad Hoc Networks are one of the core enabling technologies for tactical environments such as those envisioned in future military operations and disaster relief scenarios. While a significant amount of research has focused on technology interoperability and protocol design, there has been less work addressing the security and information assurance requirements for such environments. Properly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.