Sciweavers

1043 search results - page 130 / 209
» Monitoring Service
Sort
View
ECBS
2007
IEEE
118views Hardware» more  ECBS 2007»
15 years 5 months ago
An Event-Driven Architecture for Fine Grained Intrusion Detection and Attack Aftermath Mitigation
In today’s computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defe...
Jianfeng Peng, Chuan Feng, Haiyan Qiao, Jerzy W. R...
IADIS
2003
15 years 5 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire
WSC
2001
15 years 5 months ago
Taylor enterprise dynamics
Taylor Enterprise Dynamics (Taylor ED) is an objectoriented software system used to model, simulate, visualize, and monitor dynamic-flow process activities and systems. Atoms are ...
William B. Nordgren
HPDC
2010
IEEE
15 years 4 months ago
Parallel processing of data from very large-scale wireless sensor networks
In this paper we explore the problems of storing and reasoning about data collected from very large-scale wireless sensor networks (WSNs). Potential worldwide deployment of WSNs f...
Christine Jardak, Janne Riihijärvi, Frank Old...
JHSN
2006
267views more  JHSN 2006»
15 years 3 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...