Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
3638
search results - page 42 / 728
»
Distribution chain security
Sort
relevance
views
votes
recent
update
View
thumb
title
63
click to vote
IEEEARES
2006
IEEE
115
views
Security Privacy
»
more
IEEEARES 2006
»
A System Architecture for Enhanced Availability of Tightly Coupled Distributed Systems
15 years 3 months ago
Download
web.iti.upv.es
Johannes Osrael, Lorenz Froihofer, Karl M. Gö...
claim paper
Read More »
80
click to vote
AGENTS
2001
Springer
208
views
Security Privacy
»
more
AGENTS 2001
»
Distributed sensor network for real time tracking
15 years 2 months ago
Download
www.isi.edu
ÁÒ Ø × Ô Ô Ö Û × Ö ÓÙÖ ×ÓÐÙØ ÓÒ ØÓ Ö Ð¹Ø Ñ ×¹ ØÖ ÙØ Ö ×ÓÙÖ ÐÐÓ Ø ÓÒ ÔÔÐ Ø ÓÒ ÒÚÓÐÚ Ò ×ØÖ ÙØ × ØÙ Ø ÓÒ ×× ××...
Bryan Horling, Régis Vincent, Roger Mailler...
claim paper
Read More »
67
click to vote
SP
1998
IEEE
114
views
Security Privacy
»
more
SP 1998
»
Detecting Disruptive Routers: A Distributed Network Monitoring Approach
15 years 2 months ago
Download
www.cs.ucdavis.edu
Kirk A. Bradley, Steven Cheung, Nicholas J. Puketz...
claim paper
Read More »
86
click to vote
CCS
2008
ACM
149
views
Security Privacy
»
more
CCS 2008
»
Adaptive distributed mechanism against flooding network attacks based on machine learning
14 years 12 months ago
Download
personals.ac.upc.edu
Josep Lluis Berral, Nicolás Poggi, Javier A...
claim paper
Read More »
78
click to vote
COMPSAC
2006
IEEE
89
views
Software Engineering
»
more
COMPSAC 2006
»
An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks
15 years 1 months ago
Download
h.web.umkc.edu
This paper proposes an improved free-roaming mobile agent security protocol. The scheme uses "one hop backwards and two hops forwards" chain relation as the protocol cor...
Darren Xu, Lein Harn, Mayur Narasimhan, Junzhou Lu...
claim paper
Read More »
« Prev
« First
page 42 / 728
Last »
Next »