Sciweavers

5475 search results - page 1026 / 1095
» Model Driven Security
Sort
View
125
Voted
IAT
2007
IEEE
15 years 7 months ago
Agent-Based Network Intrusion Detection System
The paper presents security platform based on agents as an efficient and robust solution for high-performance intrusion detection system designed for deployment on highspeed netw...
Vojtech Krmicek, Pavel Celeda, Martin Rehák...
95
Voted
ICC
2007
IEEE
126views Communications» more  ICC 2007»
15 years 7 months ago
Responsiveness on the Interactive Grid
The Grid vision promises the secure and dynamic sharing of heterogeneous resources across the Internet. To date the emphasis has been on supercomputing scenarios where a relatively...
Colin Allison, Stuart D. J. Purdie, Alan Miller
126
Voted
IEEEIAS
2007
IEEE
15 years 7 months ago
An LSB Data Hiding Technique Using Prime Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. First we mathematically m...
Sandipan Dey, Ajith Abraham, Sugata Sanyal
109
Voted
INFOCOM
2007
IEEE
15 years 6 months ago
An Open and Scalable Emulation Infrastructure for Large-Scale Real-Time Network Simulations
— We present a software infrastructure that embeds physical hosts in a simulated network. Aiming to create a largescale real-time virtual network testbed, our real-time interacti...
Jason Liu, Scott Mann, Nathanael Van Vorst, Keith ...
133
Voted
ISPASS
2007
IEEE
15 years 6 months ago
An Analysis of Performance Interference Effects in Virtual Environments
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...
« Prev « First page 1026 / 1095 Last » Next »