Sciweavers

3651 search results - page 629 / 731
» Data Mining for Security Applications
Sort
View
MOBIQUITOUS
2007
IEEE
15 years 5 months ago
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
— Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs...
Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishne...
EUROMICRO
2006
IEEE
15 years 5 months ago
BGP-like TE Capabilities for SHIM6
In this paper we present a comprehensive set of mechanisms that restore to the site administrator the capacity of enforcing Traffic Engineering (TE) policies in a multiaddressed I...
Marcelo Bagnulo, Alberto García-Martí...
ICICIC
2006
IEEE
15 years 5 months ago
Relational Databases Watermark Technique Based on Content Characteristic
With the development of the Internet and wide applications of databases, the databases providers are worrying about their ownership of the databases. Combined with the digital wat...
Yong Zhang, Xiamu Niu, Dongning Zhao, Juncao Li, S...
ATAL
2004
Springer
15 years 4 months ago
Self-Protected Mobile Agents
In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a ...
Joan Ametller, Sergi Robles, Jose A. Ortega-Ruiz
76
Voted
RTAS
1996
IEEE
15 years 3 months ago
AIDA-based real-time fault-tolerant broadcast disks
The proliferation of mobile computers and wireless networks requires the design of future distributed real-time applications to recognize and deal with the signi cant asymmetry be...
Azer Bestavros