Sciweavers

2503 search results - page 208 / 501
» Building Computer Network Attacks
Sort
View
INFOCOM
2011
IEEE
14 years 5 months ago
Secure friend discovery in mobile social networks
– Mobile social networks extend social networks in the cyberspace into the real world by allowing mobile users to discover and interact with existing and potential friends who ha...
Wei Dong, Vacha Dave, Lili Qiu, Yin Zhang
NDSS
2006
IEEE
15 years 8 months ago
Enterprise Security: A Community of Interest Based Approach
Enterprise networks today carry a range of mission critical communications. A successful worm attack within an enterprise network can be substantially more devastating to most com...
Patrick Drew McDaniel, Subhabrata Sen, Oliver Spat...
IPPS
2007
IEEE
15 years 8 months ago
Distributed IDS using Reconfigurable Hardware
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
Ashok Kumar Tummala, Parimal Patel
CDC
2009
IEEE
119views Control Systems» more  CDC 2009»
15 years 6 months ago
On observer based stabilization of networked systems
— Stabilizability of linear time invariant networked systems of general structure is studied with an observer-based approach. In the assumption of piecewise constant controls an ...
Paolo Caravani, Elena De Santis
125
Voted
FLAIRS
2000
15 years 3 months ago
Zooming in on Trade-Offs in Qualitative Probabilistic Networks
Qualitative probabilistic networks have been designed for probabilistic reasoning in a qualitative way. As a consequence of their coarse level of representation detail, qualitativ...
Silja Renooij, Linda C. van der Gaag, Shaw Green, ...