Sciweavers

979 search results - page 104 / 196
» Developing Dynamic Security Policies
Sort
View
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 10 months ago
MONSOON: A Coevolutionary Multiobjective Adaptation Framework for Dynamic Wireless Sensor Networks
Wireless sensor applications (WSNs) are often required to simultaneously satisfy conflicting operational objectives (e.g., latency and power consumption). Based on an observation...
Pruet Boonma, Junichi Suzuki
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
14 years 10 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 8 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
NIPS
2003
15 years 5 months ago
Distributed Optimization in Adaptive Networks
We develop a protocol for optimizing dynamic behavior of a network of simple electronic components, such as a sensor network, an ad hoc network of mobile devices, or a network of ...
Ciamac Cyrus Moallemi, Benjamin Van Roy
EUROPAR
2004
Springer
15 years 9 months ago
Agreement-Based Interactions for Experimental Science
Enabling quality of service (QoS) in the Grids requires not only resource management strategies but also the development of protocols enabling structured negotiation for the use of...
Katarzyna Keahey, Takuya Araki, Peter Lane