Sciweavers

185 search results - page 28 / 37
» File and Memory Security Analysis for Grid Systems
Sort
View
90
Voted
SENSYS
2005
ACM
15 years 6 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
100
Voted
JSSPP
2007
Springer
15 years 6 months ago
A Self-optimized Job Scheduler for Heterogeneous Server Clusters
Heterogeneous clusters and grid infrastructures are becoming increasingly popular. In these computing infrastructures, machines have different resources, including memory sizes, d...
Elad Yom-Tov, Yariv Aridor
CORR
2010
Springer
206views Education» more  CORR 2010»
15 years 14 days ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
CCS
2011
ACM
14 years 10 days ago
BitShred: feature hashing malware for scalable triage and semantic analysis
The sheer volume of new malware found each day is growing at an exponential pace. This growth has created a need for automatic malware triage techniques that determine what malwar...
Jiyong Jang, David Brumley, Shobha Venkataraman
IPPS
2005
IEEE
15 years 6 months ago
Characterizing Secure Dynamic Web Applications Scalability
Security in the access to web contents and the interaction with web sites is becoming one of the most important issues in Internet. Servers need to provide certain levels of secur...
Jordi Guitart, Vicenç Beltran, David Carrer...