Sciweavers

4511 search results - page 674 / 903
» Observation Based System Security
Sort
View
117
Voted
GECCO
2005
Springer
183views Optimization» more  GECCO 2005»
15 years 9 months ago
802.11 network intrusion detection using genetic programming
Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Patrick LaRoche, A. Nur Zincir-Heywood
IWDW
2005
Springer
15 years 9 months ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...
115
Voted
POLICY
2005
Springer
15 years 9 months ago
Obligation Policies: An Enforcement Platform
The use of policy-based mechanisms significantly reduces the complexity associated with applicational development and operation. In particular, history-based policies allow the s...
Pedro Gama, Paulo Ferreira
125
Voted
ATAL
2004
Springer
15 years 9 months ago
Self-Protected Mobile Agents
In this paper, we present a new solution for the implementation of flexible protection mechanisms in the context of mobile agent systems, where security problems are currently a ...
Joan Ametller, Sergi Robles, Jose A. Ortega-Ruiz
122
Voted
DEXAW
2003
IEEE
128views Database» more  DEXAW 2003»
15 years 9 months ago
Current Mobile Payment Procedures on the German Market from the View of Customer Requirements
The key to mobile payment acceptance is in the hands of customers. In this paper we use the results of the mobile payment survey MP1 in order to identify and roughly weigh the mos...
Key Pousttchi, Mario Zenker