Sciweavers

9842 search results - page 1963 / 1969
» Net-Centric Information Management
Sort
View
CCS
2003
ACM
15 years 2 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves
CCS
2003
ACM
15 years 2 months ago
Monitoring and early warning for internet worms
After the Code Red incident in 2001 and the SQL Slammer in January 2003, it is clear that a simple self-propagating worm can quickly spread across the Internet, infects most vulne...
Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald...
EWSPT
2003
Springer
15 years 2 months ago
Providing Highly Automated and Generic Means for Software Deployment Process
We present a new approach for the management and enactment of deployment process by a deployment processor ORYA (Open enviRonment to deploY Applications). ORYA aims to integrate te...
Vincent Lestideau, Noureddine Belkhatir
GCC
2003
Springer
15 years 2 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
GW
2003
Springer
157views Biometrics» more  GW 2003»
15 years 2 months ago
Multimodality and Gestures in the Teacher?s Communication
The paper presents a research on the multimodal communication of teachers in the classroom. The “musical score”, a procedure for the analysis of multimodal communication, is us...
Giorgio Merola, Isabella Poggi
« Prev « First page 1963 / 1969 Last » Next »