Sciweavers

1013 search results - page 153 / 203
» Intrusion detection
Sort
View
EASSS
2001
Springer
15 years 2 months ago
Social Knowledge in Multi-agent Systems
This contribution presents a knowledge-based model of the agents’ mutual awareness (social knowledge) and justifies its role in various classes of applications of the concept of...
Vladimír Marík, Michal Pechoucek, Ol...
97
Voted
ICCCN
1998
IEEE
15 years 2 months ago
On the Vulnerabilities and Protection of OSPF Routing Protocol
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least ...
Feiyi Wang, Shyhtsun Felix Wu
85
Voted
AUSAI
2006
Springer
15 years 1 months ago
DynamicWEB: Profile Correlation Using COBWEB
Establishing relationships within a dataset is one of the core objectives of data mining. In this paper a method of correlating behaviour profiles in a continuous dataset is presen...
Joel Scanlan, Jacky Hartnett, Raymond Williams
90
Voted
FCCM
2004
IEEE
101views VLSI» more  FCCM 2004»
15 years 1 months ago
Secure Remote Control of Field-programmable Network Devices
A circuit and an associated lightweight protocol have been developed to secure communication between a control console and remote programmable network devices1 . The circuit provi...
Haoyu Song, Jing Lu, John W. Lockwood, James Mosco...
WSC
2007
15 years 15 days ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...