Sciweavers

144 search results - page 5 / 29
» Emergency Response Communications and Associated Security Ch...
Sort
View
ECAL
2003
Springer
13 years 11 months ago
The Learning and Emergence of Mildly Context Sensitive Languages
This paper describes a framework for studies of the adaptive acquisition and evolution of language, with the following components: language learning begins by associating words wit...
Edward P. Stabler, Travis C. Collier, Gregory M. K...
CCS
2005
ACM
13 years 11 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
WD
2010
13 years 4 months ago
Content Centric Networking in tactical and emergency MANETs
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...
Soon-Young Oh, Davide Lau, Mario Gerla
COMPSAC
2009
IEEE
13 years 11 months ago
A Framework for Cost Sensitive Assessment of Intrusion Response Selection
Abstract—In recent years, cost-sensitive intrusion response has gained significant interest, mainly due to its emphasis on the balance between potential damage incurred by the i...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
AICT
2006
IEEE
135views Communications» more  AICT 2006»
14 years 10 days ago
Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks
The inherent freedom due to a lack of central authority in self-organized mobile ad hoc networks introduces challenges for security and trust management. Arguably, trust managemen...
Reijo Savola, Ilkka Uusitalo