Sciweavers

186 search results - page 15 / 38
» Operational Characteristics of an Automated Intrusion Respon...
Sort
View
MOBILWARE
2009
ACM
15 years 8 months ago
A Component-Based Approach for Realizing User-Centric Adaptive Systems
We discuss a generic architecture for building user-centric systems. The characteristic feature of such systems is a control loop that monitors the user’s state, and produces a h...
Gilbert Beyer, Moritz Hammer, Christian Kroiss, An...
CAISE
2006
Springer
15 years 5 months ago
Loosely-Coupled Process Automation in Medical Environments
Abstract. We discuss a case study for the hospital scenario where workflow model components are distributed across various computers or devices (e.g. mobile phones, PDAs, sensors, ...
Jurate Vysniauskaite
CCS
2003
ACM
15 years 7 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
IISWC
2008
IEEE
15 years 8 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
DAC
2008
ACM
16 years 2 months ago
Automated hardware-independent scenario identification
Scenario-based design exploits the time-varying execution behavior of applications by dynamically adapting the system on which they run. This is a particularly interesting design ...
Juan Hamers, Lieven Eeckhout