Sciweavers

Share
19 search results - page 1 / 4
» ieeeias 2008
Sort
View
IEEEIAS
2008
IEEE
8 years 9 months ago
Semantics-Driven Introspection in a Virtual Environment
Francesco Tamberi, Dario Maggiari, Daniele Sgandur...
IEEEIAS
2008
IEEE
8 years 9 months ago
Abusing SIP Authentication
The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. ...
Humberto J. Abdelnur, Tigran Avanesov, Michaë...
IEEEIAS
2008
IEEE
8 years 9 months ago
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything...
Václav Snásel, Jan Platos, Pavel Kr&...
IEEEIAS
2008
IEEE
8 years 9 months ago
A Device Management Framework for Secure Ubiquitous Service Delivery
In a mobile ubiquitous environment, service interactions between a user device and a service provider should be secure, regardless of the type of device used to access or consume ...
Adrian Leung, Chris J. Mitchell
books