Sciweavers

3812 search results - page 28 / 763
» Combinations of TRAP Based Systems
Sort
View
DSOM
2007
Springer
15 years 3 months ago
Efficient Web Services Event Reporting and Notifications by Task Delegation
Web Services are an XML technology recently viewed as capable of being used for network management. A key aspect of WS in this domain is event reporting. WS-based research in this ...
Aimilios Chourmouziadis, George Pavlou
DASC
2006
IEEE
15 years 3 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...
ACMSE
2006
ACM
15 years 3 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
SAC
2009
ACM
15 years 2 months ago
Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios
During a disaster, emergency response operations can benefit from the establishment of a wireless ad hoc network. We propose the use of autonomous robots that move inside a disas...
Stelios Timotheou, Georgios Loukas
92
Voted
ICRA
2006
IEEE
180views Robotics» more  ICRA 2006»
15 years 3 months ago
Development of Wearable Sensor Combinations for Human Lower Extremity Motion Analysis
– A wearable sensory system for human lower extremity motion analysis is proposed, and an intelligent computation method for this sensory system is presented. The standard method...
Tao Liu, Yoshio Inoue, Kyoko Shibata, Haruhiko Mor...