Sciweavers

2517 search results - page 157 / 504
» Secure Deployment of Components
Sort
View
ICSE
1999
IEEE-ACM
15 years 8 months ago
An Architectural Style for Multiple Real-Time Data Feeds
We present an architectural style for the integration of multiple real-time data feeds on Windows-NT platforms. We motivate the development of this style by highlighting different...
Neil Roodyn, Wolfgang Emmerich
123
Voted
COMPSAC
2005
IEEE
15 years 9 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
PEWASUN
2005
ACM
15 years 9 months ago
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks
Inherent to the wireless sensor networks are the two major problems of the broadcasting vulnerability, the limited computational capability and power budget. Even though security ...
Hamdy S. Soliman, Mohammed Omari
103
Voted
CCS
2003
ACM
15 years 9 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
148
Voted
ACSAC
1998
IEEE
15 years 8 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron