University of Tubingen

Displaying 1-5 of 5 results

  • White Papers // Dec 2009

    Data Collection in Future Mobile Networks

    Future mobile networks will be increasingly heterogeneous. Already today, wireless LAN is used by many mobile network operators as an addition to traditional technologies like GSM and UMTS; WiMax and 3GPP Long Term Evolution (LTE) will be added. Having heterogeneous wireless networks, one challenging research question needs to be answered:...

    Provided By University of Tubingen

  • White Papers // Nov 2009

    Visualization and Explanation of Payload-Based Anomaly Detection

    The threat posed by modern network attacks requires novel means for detection of intrusions, as regular signature-based systems fail to cope with the amount and diversity of attacks. Recently, several methods for detection of anomalies in network payloads have been proposed to counteract this threat and identify novel attacks during...

    Provided By University of Tubingen

  • White Papers // Mar 2009

    Data Collection for Heterogeneous Handover Decisions in Beyond 3G Networks

    Future mobile networks will be increasingly heterogeneous. Already today, wireless LAN is used by many mobile network operators as an addition to traditional technologies like GSM and UMTS; WiMax and 3GPP Long Term Evolution (LTE) will be added. Having heterogeneous wireless networks, one challenging research question needs to be answered:...

    Provided By University of Tubingen

  • White Papers // Jan 2009

    Indoor Positioning Via Three Different RF Technologies

    The continuous tracking of mobile systems via active or passive RFID is a desirable but difficult to achieve objective. This paper presents the experimental results of positioning techniques using passive UHF RFID, Bluetooth, and WLAN. The paper thereby employs three orthogonal measuring techniques: detection rates, signal strength, and round trip...

    Provided By University of Tubingen

  • White Papers // May 2008

    Learning and Classification of Malware Behavior

    Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variants severely undermine the effectiveness of classical signature-based detection. Yet variants of malware families share typical behavioral patterns reflecting its origin and...

    Provided By University of Tubingen

  • White Papers // May 2008

    Learning and Classification of Malware Behavior

    Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variants severely undermine the effectiveness of classical signature-based detection. Yet variants of malware families share typical behavioral patterns reflecting its origin and...

    Provided By University of Tubingen

  • White Papers // Jan 2009

    Indoor Positioning Via Three Different RF Technologies

    The continuous tracking of mobile systems via active or passive RFID is a desirable but difficult to achieve objective. This paper presents the experimental results of positioning techniques using passive UHF RFID, Bluetooth, and WLAN. The paper thereby employs three orthogonal measuring techniques: detection rates, signal strength, and round trip...

    Provided By University of Tubingen

  • White Papers // Dec 2009

    Data Collection in Future Mobile Networks

    Future mobile networks will be increasingly heterogeneous. Already today, wireless LAN is used by many mobile network operators as an addition to traditional technologies like GSM and UMTS; WiMax and 3GPP Long Term Evolution (LTE) will be added. Having heterogeneous wireless networks, one challenging research question needs to be answered:...

    Provided By University of Tubingen

  • White Papers // Mar 2009

    Data Collection for Heterogeneous Handover Decisions in Beyond 3G Networks

    Future mobile networks will be increasingly heterogeneous. Already today, wireless LAN is used by many mobile network operators as an addition to traditional technologies like GSM and UMTS; WiMax and 3GPP Long Term Evolution (LTE) will be added. Having heterogeneous wireless networks, one challenging research question needs to be answered:...

    Provided By University of Tubingen

  • White Papers // Nov 2009

    Visualization and Explanation of Payload-Based Anomaly Detection

    The threat posed by modern network attacks requires novel means for detection of intrusions, as regular signature-based systems fail to cope with the amount and diversity of attacks. Recently, several methods for detection of anomalies in network payloads have been proposed to counteract this threat and identify novel attacks during...

    Provided By University of Tubingen