Sciweavers

2269 search results - page 403 / 454
» Behavioral Intrusion Detection
Sort
View
114
Voted
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
15 years 6 months ago
Functional Coverage Driven Test Generation for Validation of Pipelined Processors
Functional verification of microprocessors is one of the most complex and expensive tasks in the current system-on-chip design process. A significant bottleneck in the validatio...
Prabhat Mishra, Nikil D. Dutt
INFOCOM
2005
IEEE
15 years 6 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...
95
Voted
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
15 years 6 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
97
Voted
ITCC
2005
IEEE
15 years 6 months ago
Protecting On-Line Casinos against Fraudulent Player Drop-Out
Some multiplayer, on-line games rely on the collaboration of all participating players. If a player’s gamble is aborted, the rest of players cannot continue playing. This behavi...
Joaquín García, Frédér...
95
Voted
WECWIS
2005
IEEE
142views ECommerce» more  WECWIS 2005»
15 years 6 months ago
Implementing Web Service Protocols in SOA: WS-Coordination and WS-BusinessActivity
Web Service protocol standards should be unambiguous and provide a complete description of the allowed behavior of the protocols’ participants. Implementation of such protocols ...
Friedrich H. Vogt, Simon Zambrovski, Boris Gruschk...