Learn More
Anomaly-based intrusion detection is a crucial research issue as it permits to identify attacks that does not necessarily have known signatures. However, approaches using anomalies often consume more resources than those based on misuse detection and have a higher false alarm rate. This paper presents an efficient anomaly analysis method that is proved to(More)
Several solutions were proposed to address VoIP security and quality of service in mobile wireless networks. However, the two aspects were approached by the literature independently of each other. The issue becomes more important to address in the context of vehicular adhoc networks where vehicles are highly mobile and the SIP handover procedure may exhibit(More)
One of the major interest perceived by research in digital forensic investigation is the development of theoretical andscientifically proven methods of incident analysis. However, two main problems, which remain unsolved by the literature, could lead the formal incident analysis to be inconclusive. The former is related to the absence of techniques to cope(More)