Sciweavers

6689 search results - page 43 / 1338
» A Network Security Monitor
Sort
View
OOPSLA
2007
Springer
15 years 10 months ago
Making trace monitors feasible
Pavel Avgustinov, Julian Tibble, Oege de Moor
73
Voted
CCS
2010
ACM
15 years 9 months ago
Preventing drive-by download via inter-module communication monitoring
Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Y...
HAIS
2008
Springer
15 years 5 months ago
Multi-agent System for Management and Monitoring of Routes Surveillance
This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
Sara Rodríguez, Javier Bajo
121
Voted
HOTNETS
2010
14 years 11 months ago
How to tell an airport from a home: techniques and applications
Today's Internet services increasingly use IP-based geolocation to specialize the content and service provisioning for each user. However, these systems focus almost exclusiv...
Andreas Pitsillidis, Yinglian Xie, Fang Yu, Mart&i...
141
Voted
DSN
2004
IEEE
15 years 8 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra