Sciweavers

2645 search results - page 22 / 529
» Autonomous security for autonomous systems
Sort
View
ISI
2008
Springer
15 years 1 months ago
A Collaborative Forensics Framework for VoIP Services in Multi-network Environments
We propose a collaborative forensics framework to trace back callers of VoIP services in a multi-network environment. The paper is divided into two parts. The first part discusses ...
Hsien-Ming Hsu, Yeali S. Sun, Meng Chang Chen
149
Voted
IEEECIT
2010
IEEE
14 years 11 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
122
Voted
TIFS
2008
149views more  TIFS 2008»
15 years 1 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
95
Voted
SAINT
2006
IEEE
15 years 8 months ago
A Prototype of a Secure Autonomous Bootstrap Mechanism for Control Networks
There are many kinds of control networks, which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automatio...
Nobuo Okabe, Shoichi Sakane, Masahiro Ishiyama, At...
143
Voted
IEE
2011
14 years 8 months ago
Using autonomous components to improve runtime qualities of software
: In the development of software systems, quality properties should be considered along with the development process so that the qualities of software systems can be inferred and p...
Wenpin Jiao