Sciweavers

2979 search results - page 418 / 596
» Modelling secure multiagent systems
Sort
View
ATAL
2010
Springer
15 years 5 months ago
A quantified distributed constraint optimization problem
In this paper, we propose a Quantified Distributed Constraint Optimization problem (QDCOP) that extends the framework of Distributed Constraint Optimization problems (DCOPs). DCOP...
Toshihiro Matsui, Hiroshi Matsuo, Marius-Calin Sil...
IJIIDS
2008
201views more  IJIIDS 2008»
15 years 4 months ago
MALEF: Framework for distributed machine learning and data mining
: Growing importance of distributed data mining techniques has recently attracted attention of researchers in multiagent domain. Several agent-based application have been already c...
Jan Tozicka, Michael Rovatsos, Michal Pechoucek, S...
HOTOS
2003
IEEE
15 years 9 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh
138
Voted
ACSAC
2002
IEEE
15 years 9 months ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
WORM
2003
15 years 5 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...