Sciweavers

2503 search results - page 398 / 501
» Building Computer Network Attacks
Sort
View
ICN
2005
Springer
15 years 7 months ago
Scalable Group Key Management with Partially Trusted Controllers
Abstract. Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed ...
Himanshu Khurana, Rafael Bonilla, Adam J. Slagell,...
RAID
2004
Springer
15 years 6 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
ICDM
2002
IEEE
156views Data Mining» more  ICDM 2002»
15 years 6 months ago
Predicting Rare Events In Temporal Domains
Temporal data mining aims at finding patterns in historical data. Our work proposes an approach to extract temporal patterns from data to predict the occurrence of target events,...
Ricardo Vilalta, Sheng Ma
ACSAC
2001
IEEE
15 years 5 months ago
Information Security: Science, Pseudoscience, and Flying Pigs
The state of the science of information security is astonishingly rich with solutions and tools to incrementally and selectively solve the hard problems. In contrast, the state of...
Roger R. Schell
ATAL
2003
Springer
15 years 5 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto