The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RFC4893 defines the transition mechanisms to use 4 byte Autonomous System numbers. This RFC has some inconsistencies and has not been implemented correctly by all vendors. As a result, several major Internet incidents related with the handling of bogus 4 byte Autonomous System Numbers (ASNs) have ocurred. The last one was registered between the 17th and the 18th August, 2009. This paper analyses BGP-4...
The InterGrid system aims to provide an execution environment for running applications on top of interconnected infrastructures. The system uses virtual machines as building blocks to construct execution environments that span multiple computing sites. Such environments can be extended to operate on cloud infrastructures, such as Amazon EC2. This article provides an abstract view of the proposed architecture...
IEEE P1900.4 is an emerging standard for optimized radio resource utilization where cognitive radio technologies are used for efficient spectrum utilization. In this paper, we design and implement a cognitive wireless network system based on open documents of IEEE P1900.4, and evaluate its performance using UDP streaming and HTTP download. Our experiments show interesting results that total network...
Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.