Sciweavers

16 search results - page 1 / 4
» System Health and Intrusion Monitoring Using a Hierarchy of ...
Sort
View
RAID
2001
Springer
13 years 9 months ago
System Health and Intrusion Monitoring Using a Hierarchy of Constraints
Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Ka...
RAID
2001
Springer
13 years 9 months ago
Autonomic Response to Distributed Denial of Service Attacks
ed Credential Chain Discovery in Trust Management - Extended Abstract............................... 35 N. Li, W. Winsborough, and J. Mitchell System Health and Intrusion Monitorin...
Daniel F. Sterne, Kelly Djahandari, Brett Wilson, ...
ICDCSW
2006
IEEE
13 years 10 months ago
An Event Service Supporting Autonomic Management of Ubiquitous Systems for e-Health
— Healthcare and economic drivers have increased the desire to deploy systems for continuous monitoring of patients, both in hospital and outpatient settings. Such systems must o...
Stephen Strowes, Nagwa Badr, Steven Heeps, Emil Lu...
DSD
2005
IEEE
70views Hardware» more  DSD 2005»
13 years 10 months ago
Vital Signs Remote Management System for PDAs
It is a challenge to provide an efficient healthcare service for countries with continental dimensions. Mechanisms for a more efficient and better attendance of patients are nec...
Danielly Cruz, Edna Barros
RAID
2004
Springer
13 years 9 months ago
Formal Reasoning About Intrusion Detection Systems
We present a formal framework for the analysis of intrusion detection systems (IDS) that employ declarative rules for attack recognition, e.g. specification-based intrusion detect...
Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Ka...