Sciweavers

2979 search results - page 377 / 596
» Modelling secure multiagent systems
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
16 years 4 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
IFIP
2005
Springer
15 years 10 months ago
Opacity Generalised to Transition Systems
Recently, opacity has proved to be a promising technique for describing security properties. Much of the work has been couched in terms of Petri nets. Here, we extend the notion of...
Jeremy Bryans, Maciej Koutny, Laurent Mazaré...
CDC
2010
IEEE
272views Control Systems» more  CDC 2010»
14 years 11 months ago
Node capture attacks in wireless sensor networks: A system theoretic approach
In this paper we address the problem of physical node capture attacks in wireless sensor networks and provide a control theoretic framework to model physical node capture, cloned n...
Tamara Bonaci, Linda Bushnell, Radha Poovendran
DEXAW
1997
IEEE
99views Database» more  DEXAW 1997»
15 years 8 months ago
A Framework for Dynamic Changes in Workflow Management Systems
Current workflow management systems (WFMSs) are only applicable in a reliable and secure manner, if the business process (BP) to be supported is wellstructured. As ad hoc deviatio...
Manfred Reichert, Peter Dadam
EEMMAS
2007
Springer
15 years 10 months ago
Engineering Systems Which Generate Emergent Functionalities
Complexity of near future and even nowadays applications is exponentially increasing. In order to tackle the design of such complex systems, being able to engineer self-organising ...
Marie Pierre Gleizes, Valérie Camps, Jean-P...