Sciweavers

2503 search results - page 127 / 501
» Building Computer Network Attacks
Sort
View
MSWIM
2005
ACM
15 years 3 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
TEC
2002
166views more  TEC 2002»
14 years 9 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
DCOSS
2008
Springer
14 years 11 months ago
SAKE: Software Attestation for Key Establishment in Sensor Networks
Abstract. This paper presents a protocol called SAKE (Software Attestation for Key Establishment), for establishing a shared key between any two neighboring nodes of a sensor netwo...
Arvind Seshadri, Mark Luk, Adrian Perrig
GCC
2003
Springer
15 years 3 months ago
A Service-Based Hierarchical Architecture for Parallel Computing in Grid Environment
Grid computing technologies enable widespread sharing and coordinated us of networked resources, including computing resources. Open Grid Service Architecture (OGSA) marries Web se...
Weiqin Tong, Jingbo Ding, Jianquan Tang, Bo Wang, ...
RAID
1999
Springer
15 years 2 months ago
Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of informati...
John Kelsey, Bruce Schneier