Sciweavers

4330 search results - page 109 / 866
» Analyzing security architectures
Sort
View
POLICY
2007
Springer
15 years 11 months ago
An Automated Framework for Validating Firewall Policy Enforcement
The implementation of network security devices such as firewalls and IDSs are constantly being improved to accommodate higher security and performance standards. Using reliable a...
Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-S...
INFOCOM
2006
IEEE
15 years 11 months ago
Intelligent Distribution of Intrusion Prevention Services on Programmable Routers
— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...
AGENTS
2001
Springer
15 years 9 months ago
Building agents for service provisioning out of components
The CASA architecture describes a platform for the provisioning of services by agents by supporting three levels of agent design. At the base level is a framework to build an agen...
Ralf Sesseler
150
Voted
CCS
2010
ACM
15 years 5 months ago
DieHarder: securing the heap
Heap-based attacks depend on a combination of memory management errors and an exploitable memory allocator. We analyze a range of widely-deployed memory allocators, including thos...
Gene Novark, Emery D. Berger
77
Voted
DAC
2002
ACM
16 years 5 months ago
System design methodologies for a wireless security processing platform
Srivaths Ravi, Anand Raghunathan, Nachiketh R. Pot...