Sciweavers

2503 search results - page 162 / 501
» Building Computer Network Attacks
Sort
View
SEMWEB
2007
Springer
15 years 7 months ago
On the Foundations of Computing Deltas Between RDF Models
The ability to compute the differences that exist between two RDF models is an important step to cope with the evolving nature of the Semantic Web (SW). In particular, RDF Deltas c...
Dimitris Zeginis, Yannis Tzitzikas, Vassilis Chris...
104
Voted
AE
2001
Springer
15 years 6 months ago
Evolving Objects: A General Purpose Evolutionary Computation Library
This paper presents the evolving objects library (EOlib), an object-oriented framework for evolutionary computation (EC) that aims to provide a flexible set of classes to build EC...
Maarten Keijzer, Juan J. Merelo Guervós, Gu...
JSAC
2006
127views more  JSAC 2006»
15 years 1 months ago
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Abstract-- Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose ...
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang
119
Voted
ESORICS
2002
Springer
16 years 1 months ago
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones
Network based intrusions have become a serious threat to the users of the Internet. Intruders who wish to attack computers attached to the Internet frequently conceal their identit...
Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu
RAID
2007
Springer
15 years 7 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...