Sciweavers

579 search results - page 83 / 116
» Secure Access to Medical Data over the Internet
Sort
View
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 5 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...
MINENET
2006
ACM
15 years 7 months ago
Forensic analysis of autonomous system reachability
Security incidents have an adverse impact not only on end systems, but also on Internet routing, resulting in many out-of-reach prefixes. Previous work has looked at performance ...
D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
15 years 7 months ago
Toward a Query Language for Network Attack Data
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
SRDS
2007
IEEE
15 years 7 months ago
Enhancing Edge Computing with Database Replication
As the use of the Internet continues to grow explosively, edge computing has emerged as an important technique for delivering Web content over the Internet. Edge computing moves d...
Yi Lin, Bettina Kemme, Marta Patiño-Mart&ia...
IEEEAMS
2003
IEEE
15 years 6 months ago
Programming Systems for Autonomy
This paper describes a new approach to programming autonomic systems. Autonomic functions are integrated into element objects at design time using a special language called JSpoon...
Alexander V. Konstantinou, Yechiam Yemini