Sciweavers

483 search results - page 16 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
ALIFE
2004
14 years 9 months ago
Self-Protection and Diversity in Self-Replicating Cellular Automata
The concept of "self-protection", a capability of an organism to protect itself from exogenous attacks, is introduced to the design of artificial evolutionary systems as...
Hiroki Sayama
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 3 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
MHCI
2009
Springer
15 years 4 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
ISCC
2009
IEEE
152views Communications» more  ISCC 2009»
15 years 4 months ago
Perceptual based voice multi-hop transmission over wireless sensor networks
Abstract—Multimedia applications over wireless sensor networks (WSNs) are rapidly gaining interest by the research community in order to develop new and mission critical services...
M. Petracca, G. Litovsky, A. Rinotti, Marco Tacca,...
83
Voted
ICCCN
2008
IEEE
15 years 3 months ago
Logical Topology Design for IP-over-WDM Networks: A Hybrid Approach for Minimum Protection Capacity
—The problem of designing high capacity and high bit rate IP-over-WDM networks, which can provide uninterrupted service in the presence of network equipment failures, continues t...
Muhammad S. Javed, Krishnaiyan Thulasiraman, Guoli...