Sciweavers

2645 search results - page 31 / 529
» Autonomous security for autonomous systems
Sort
View
SAC
2008
ACM
15 years 1 months ago
Autonomic management policy specification in Tune
Distributedsoftwareenvironmentsareincreasinglycomplex anddiculttomanage,astheyintegratevariouslegacysoftware with specic management interfaces. Moreover, the factthatmanagementtas...
Laurent Broto, Daniel Hagimont, Patricia Stolf, No...
ECBS
2005
IEEE
92views Hardware» more  ECBS 2005»
15 years 7 months ago
Towards a Systemic Approach to Autonomic Systems Engineering
An autonomic system is structured as a network of autonomic elements that collaborate to achieve the system’s purpose. This paper examines the potential benefit of using well-es...
David W. Bustard, Roy Sterritt, A. Taleb-Bendiab, ...
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
15 years 3 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...
AICCSA
2006
IEEE
143views Hardware» more  AICCSA 2006»
15 years 8 months ago
An Innovative Self-Configuration Approach for Networked Systems and Applications
The increased complexity, heterogeneity and the dynamism of networked systems and services make current control and management tools to be ineffective in managing and securing suc...
Huoping Chen, Salim Hariri, Fahd Rasul
ICAC
2009
IEEE
15 years 8 months ago
Threat-model-driven runtime adaptation and evaluation of intrusion detection system
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is ...
Martin Rehák, Eugen Staab, Volker Fusenig, ...