Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICIMP
ICIMP 2008
Generate Citations
Internet Monitoring and Protection, International Conference on
June 29 2008 to July 5 2008
ISBN: 978-0-7695-3189-2
Table of Contents
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-vii
VOC Based Key Quality Indicators for High-Speed Internet Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-58
by
Dae-Woo Kim
,
Hyun-Min Lim
,
Jae-Hyoung Yoo
,
Sang-Ha Kim
Peer-to-Peer Networks Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 74-79
by
J. Schäfer
,
K. Malinka
,
P. Hanácek
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Preface
Freely available from IEEE.
pp. viii
Papers
Committees
Freely available from IEEE.
pp. ix-xiv
Papers
Dynamic Verification and Control of Mobile Peer-to-Peer Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
George Spanoudakis
,
Christos Kloukinas
,
Kelly Androutsopoulos
Papers
HIDDEN: Hausdorff Distance Based Intrusion Detection Approach DEdicated to Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-16
by
Yann Labit
,
Johan Mazel
Papers
Mouse Trapping: A Flow Data Reduction Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-22
by
Sven Anderson
,
Dieter Hogrefe
Papers
Large-Scale Video Surveillance Systems: New Performance Parameters and Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-30
by
S. Sutor
,
F. Matusek
,
F. Kruse
,
K. Kraus
,
R. Reda
Efficient Security Measurements and Metrics for Risk Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-138
by
I. Tashi
,
S. Ghernaouti-Helie
Papers
Impact of Traffic Mix and Packet Sampling on Anomaly Visibility
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Bernhard Tellenbach
,
Daniela Brauckhoff
,
Martin May
Papers
Traffic Anomaly Detection at Fine Time Scales with Bayes Nets
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-46
by
Jeff Kline
,
Sangnam Nam
,
Paul Barford
,
David Plonka
,
Amos Ron
Papers
Towards a User-Centric Identity-Usage Monitoring System
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-52
by
Daisuke Mashima
,
Mustaque Ahamad
An Evaluation of Major Image Search Engines on Various Query Topics
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-165
by
Ece Çakir
,
Huseyin Bahceci
,
Yiltan Bitirim
Papers
Specification-Based Denial-of-Service Detection for SIP Voice-over-IP Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 59-66
by
Sven Ehlert
,
Chengjian Wang
,
Thomas Magedanz
,
Dorgham Sisalem
Papers
Zombie Identification Port
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-73
by
Pedro R. M. In?cio
,
Jo?o V. P. Gomes
,
M?rio M. Freire
,
Manuela Pereira
,
Paulo P. Monteiro
Identity Management in Mobile Ubiquitous Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-183
by
Tor Anders Johansen
,
Ivar Jørstad
,
Do van Thanh
Papers
A Threat-Aware Signature Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-85
by
Subramanian Neelakantan
,
Shrisha Rao
Papers
Towards Fast Detecting Intrusions: Using Key Attributes of Network Traffic
Full-text access may be available. Sign in or learn about subscription options.
pp. 86-91
by
Wei Wang
,
Sylvain Gombault
,
Thomas Guyet
[Publisher's information]
Freely available from IEEE.
pp. 186-186
Papers
Cryptographic Authentication on the Communication from an 8051 Based Development Board over UDP
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-97
by
Bogdan Groza
,
Pal-Stefan Murvay
,
Ioan Silea
,
Tiberiu Ionica
Papers
NIVSS: A Nearly Indestructible Video Surveillance System
Full-text access may be available. Sign in or learn about subscription options.
pp. 98-102
by
F. Matusek
,
S. Sutor
,
K. Kraus
,
F. Kruse
,
R. Reda
Papers
An Empirical Study on Data Center System Failure Diagnosis
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-108
by
Montri Wiboonrat
Papers
A Dangerousness-Based Investigation Model for Security Event Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-118
by
V. Legrand
,
R. State
,
L. Paffumi
Papers
A Merge Method for Decentralized Discrete-Event Fault Diagnosis
Full-text access may be available. Sign in or learn about subscription options.
pp. 119-124
by
He-xuan Hu
,
Anne-lise Gehin
,
Mireille Bayart
Papers
A Holistic, Collaborative, Knowledge-Sharing Approach for Information Security Risk Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-130
by
Ekaterini Papadaki
,
Despina Polemi
,
Dimitrios Kon/nos Damilos
Papers
An Access Service Scheme with Anonymity for Ubiquitous Computing Based on Mobile IPv6
Full-text access may be available. Sign in or learn about subscription options.
pp. 139-144
by
Chou-Chen Yang
,
Gwoboa Horng
,
Jing-Wen Li
Papers
Establishing a Secure Peer Identity Association Using IMS Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-151
by
Seppo Heikkinen
Papers
A Near Real-Time System for Security Assurance Assessment
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-160
by
Nguyen Pham
,
Loic Baud
,
Patrick Bellot
,
Michel Riguidel
Papers
A Classification of Security Feedback Design Patterns for Interactive Web Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-171
by
Jaime Mu?oz-Arteaga
,
Ricardo Mendoza Gonz?lez
,
Jean Vanderdonckt
Papers
An Empirical Analysis of RS Steganalysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-177
by
Sathiamoorthy Manoharan
Papers
Author Index
Freely available from IEEE.
pp. 185
Showing 35 out of 35