Sciweavers

4262 search results - page 698 / 853
» Internet and Intranet Computing
Sort
View
IPCCC
2006
IEEE
15 years 10 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood
IROS
2006
IEEE
111views Robotics» more  IROS 2006»
15 years 10 months ago
A Delay-tolerant, Potential field-based, Network Implementation of an Integrated Navigation System
Abstract—Network controllers (NCs) are devices that are capable of converting dynamic, spatially extended, and functionally specialized modules into a taskable goal-oriented grou...
Rachana Ashok Gupta, Ahmad A. Masoud, Mo-Yuen Chow
IWIA
2006
IEEE
15 years 10 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
LCN
2006
IEEE
15 years 10 months ago
Ethernet Adaptive Link Rate: System Design and Performance Evaluation
The Internet and the devices that connect to it consume a growing and significant amount of electricity. The utilization of desktop to switch Ethernet links is generally very low ...
Chamara Gunaratne, Kenneth J. Christensen
LCN
2006
IEEE
15 years 10 months ago
Privacy-Preserving Quick Authentication in Fast Roaming Networks
Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...
Jun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang