Sciweavers

2517 search results - page 217 / 504
» Secure Deployment of Components
Sort
View
IEEEARES
2010
IEEE
15 years 8 months ago
Optimising IDS Sensor Placement
—In large network environments multiple intrusion detection sensors are needed to adequately monitor network traffic. However, deploying and managing additional sensors on a lar...
Hao Chen, John A. Clark, Siraj A. Shaikh, Howard C...
ESORICS
2008
Springer
15 years 6 months ago
Location Privacy in Location-Based Services: Beyond TTP-based Schemes
Location-Based Services (LBS) are gaining importance due to the advances in mobile networks and positioning technologies. Nevertheless, the wide deployment of LBS can jeopardise th...
Agusti Solanas, Josep Domingo-Ferrer, Antoni Mart&...
AAAI
2004
15 years 5 months ago
Identifying Terrorist Activity with AI Plan Recognition Technology
We describe the application of plan recognition techniques to support human intelligence analysts in processing national security alert sets by automatically identifying the hosti...
Peter Jarvis, Teresa F. Lunt, Karen L. Myers
WMI
2001
147views more  WMI 2001»
15 years 5 months ago
A wireless public access infrastructure for supporting mobile context-aware IPv6 applications
This paper presents a novel wireless access point architecture designed to support the development of next generation mobile context-aware applications over metropolitan scale are...
Adrian Friday, Maomao Wu, Stefan Schmid, Joe Finne...
ESORICS
2010
Springer
15 years 5 months ago
Election Verifiability in Electronic Voting Protocols
We present a formal, symbolic definition of election verifiability for electronic voting protocols in the context of the applied pi calculus. Our definition is given in terms of bo...
Steve Kremer, Mark Ryan, Ben Smyth