Sciweavers

1123 search results - page 72 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
AINA
2007
IEEE
15 years 6 months ago
Towards Quantifying the (In)Security of Networked Systems
Traditional security analyses are often geared towards cryptographic primitives or protocols. Although such analyses are absolutely necessary, they do not provide much insight for...
Xiaohu Li, T. Paul Parker, Shouhuai Xu
SENSYS
2003
ACM
15 years 5 months ago
Integrated coverage and connectivity configuration in wireless sensor networks
An effective approach for energy conservation in wireless sensor networks is scheduling sleep intervals for extraneous nodes, while the remaining nodes stay active to provide cont...
Xiaorui Wang, Guoliang Xing, Yuanfang Zhang, Cheny...
CNSR
2010
IEEE
124views Communications» more  CNSR 2010»
15 years 2 months ago
Challenges and Direction toward Secure Communication in the SCADA System
In the past few years the security issues in the supervisory control and data acquisition (SCADA) system have been investigated, and many security mechanisms have been proposed fro...
Sugwon Hong, Myungho Lee
CCS
1999
ACM
15 years 4 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise specifications that characterize normal and abnormal network packet sequences. Our speciļ...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
EUSFLAT
2003
155views Fuzzy Logic» more  EUSFLAT 2003»
15 years 1 months ago
Bayesian networks for transport decision scenarios
Bayesian networks are formal graphical languages for representation and communication of decision scenarios requiring reasoning under uncertainty. We will analyze Bayesian network...
Alexander Holland