Sciweavers

5934 search results - page 1172 / 1187
» Detecting a Network Failure
Sort
View
ESORICS
2004
Springer
15 years 4 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee
MHCI
2004
Springer
15 years 4 months ago
Interactive Positioning Based on Object Visibility
Abstract. In this paper we describe a new method and user interface for interactive positioning of a mobile device. The key element of this method is a questionanswer style dialogu...
Christian Kray, Gerd Kortuem
SEM
2004
Springer
15 years 4 months ago
Service Discovery Protocol Interoperability in the Mobile Environment
The emergence of portable computers and wireless technologies has introduced new challenges for middleware. Mobility brings new requirements and is becoming a key characteristic. M...
Yérom-David Bromberg, Valérie Issarn...
CODES
2003
IEEE
15 years 4 months ago
First results with eBlocks: embedded systems building blocks
We describe our first efforts to develop a set of off-the-shelf hardware components that ordinary people could connect to build a simple but useful class of embedded systems. The ...
Susan Cotterell, Frank Vahid, Walid A. Najjar, Har...
INFOCOM
2003
IEEE
15 years 4 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
« Prev « First page 1172 / 1187 Last » Next »