Sciweavers

292 search results - page 36 / 59
» Computing Criticality of Lines in Power Systems
Sort
View
MOBISYS
2008
ACM
15 years 9 months ago
Peopletones: a system for the detection and notification of buddy proximity on mobile phones
Mobile phones have the potential to be useful agents for their owners by detecting and reporting situations that are of interest. Several challenges emerge in the case of detectin...
Kevin A. Li, Timothy Sohn, Steven Huang, William G...
HASE
2008
IEEE
15 years 4 months ago
Securing Sensor Nodes Against Side Channel Attacks
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...
ASM
2010
ASM
15 years 4 months ago
A Basis for Feature-Oriented Modelling in Event-B
Abstract. Feature-oriented modelling is a well-known approach for Software Product Line (SPL) development. It is a widely used method when developing groups of related software. Wi...
Jennifer Sorge, Michael Poppleton, Michael Butler
FCCM
2005
IEEE
102views VLSI» more  FCCM 2005»
15 years 3 months ago
A Signature Match Processor Architecture for Network Intrusion Detection
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). NIDSs are becoming critical components of the network infrastructu...
Janardhan Singaraju, Long Bu, John A. Chandy
CASES
2005
ACM
14 years 11 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...