Sciweavers

2587 search results - page 15 / 518
» Intrusion Tolerant Systems
Sort
View
108
Voted
PRDC
2007
IEEE
15 years 8 months ago
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation
This paper presents a study on the performance of intrusion-tolerant protocols in wireless LANs. The protocols are evaluated in several different environmental settings, and also ...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...
124
Voted
IPSN
2003
Springer
15 years 7 months ago
A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks
Abstract. This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefi...
Jing Deng, Richard Han, Shivakant Mishra
136
Voted
ISCAPDCS
2003
15 years 3 months ago
Issues in Building Intrusion Tolerant Group Membership Protocols
Narasimha Prasad Subraveti, Soontaree Tanaraksirit...
157
Voted
ISSA
2008
15 years 3 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche
133
Voted
RSP
2007
IEEE
158views Control Systems» more  RSP 2007»
15 years 8 months ago
SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...