Sciweavers

186 search results - page 11 / 38
» Operational Characteristics of an Automated Intrusion Respon...
Sort
View
DFG
2004
Springer
15 years 1 months ago
Modeling and Formal Verification of Production Automation Systems
This paper presents the real-time model checker RAVEN and related theoretical background. RAVEN augments the efficiency of traditional symbolic model checking with possibilities to...
Jürgen Ruf, Roland J. Weiss, Thomas Kropf, Wo...
HICSS
2002
IEEE
136views Biometrics» more  HICSS 2002»
15 years 2 months ago
Automated Decision Technology for Network Design in Cellular Communication Systems
The location and configuration of transmission infrastructure for cellular communication networks is a complex engineering task involving many competing objectives. While minimis...
Stuart M. Allen, Steve Hurley, Roger M. Whitaker
82
Voted
ICARIS
2007
Springer
15 years 1 months ago
Defence Against 802.11 DoS Attacks Using Artificial Immune System
In this paper we present an Artificial Immune System (AIS) based security framework, which prevents a number of serious Denial of Service (DoS) attacks. The proposed security frame...
M. Zubair Shafiq, Muddassar Farooq
CF
2004
ACM
15 years 3 months ago
An architectural framework and a middleware for cooperating smart components
In a future networked physical world, a myriad of smart sensors and actuators assess and control aspects of their environments and autonomously act in response to it. Examples ran...
Antonio Casimiro, Jörg Kaiser, Paulo Ver&iacu...
71
Voted
USENIX
2007
14 years 12 months ago
From STEM to SEAD: Speculative Execution for Automated Defense
Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to autom...
Michael E. Locasto, Angelos Stavrou, Gabriela F. C...