Sciweavers

2517 search results - page 112 / 504
» Secure Deployment of Components
Sort
View
ICC
2008
IEEE
118views Communications» more  ICC 2008»
15 years 10 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
294
Voted
CASSIS
2005
Springer
15 years 9 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
113
Voted
ACSAC
2004
IEEE
15 years 7 months ago
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic
Combining an "anomaly" and a "misuse" IDSes offers the advantage of separating the monitored events between normal, intrusive or unqualified classes (ie not kn...
Elvis Tombini, Hervé Debar, Ludovic M&eacut...
SPW
2005
Springer
15 years 9 months ago
Enhancing Privacy with Shared Pseudo Random Sequences
Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
Jari Arkko, Pekka Nikander, Mats Näslund
116
Voted
IM
1997
15 years 4 months ago
A Service Engineering Approach to Inter-Domain TMN System Development
The deployment of service management systems in a multi-service environment opens a whole area of issues. Requirements for openness and reusability can be satisfied by following a...
Thanassis Tiropanis, David Lewis, A. Richter, Rong...