Sciweavers

2503 search results - page 161 / 501
» Building Computer Network Attacks
Sort
View
98
Voted
HPDC
1999
IEEE
15 years 6 months ago
A Resource Description Environment for Distributed Computing Systems
RSD (Resource and Service Description) is a software architecture for specifying, registering and accessing resources and services in complex heterogeneous computing environments....
Matthias Brune, Alexander Reinefeld, Jörg Var...
RAID
2005
Springer
15 years 7 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...
IWAN
1999
Springer
15 years 6 months ago
ANMAC: An Architectural Framework for Network Management and Control using Active Networks
In this paper, we propose a new framework called Active Network Management and Control (ANMAC) for the management and control of high speed networks. The software architecture in A...
Samphel Norden, Kenneth F. Wong
WISEC
2010
ACM
15 years 8 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
MASCOTS
2004
15 years 3 months ago
A Framework for Resource Allocation in Grid Computing
Grid computing is the future computing paradigm for enterprise applications. An enterprise application running on a grid is composed of a set of SLA-constrained sub-tasks demandin...
Daniel A. Menascé, Emiliano Casalicchio