Sciweavers

102 search results - page 14 / 21
» Secure and Dependable Patterns in Organizations: An Empirica...
Sort
View
80
Voted
SAC
2008
ACM
14 years 11 months ago
A pull-based e-mail architecture
Conventional e-mail systems are prone to problems that impact their scalability and dependability. E-mail systems operate following a "push-based" approach: the sender s...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
MAGS
2010
106views more  MAGS 2010»
14 years 6 months ago
On the convergence of autonomous agent communities
Community is a common phenomenon in natural ecosystems, human societies as well as artificial multi-agent systems such as those in web and Internet based applications. In many sel...
Hong Zhu, Fang Wang, Shufeng Wang
CCS
1999
ACM
15 years 3 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise specifications that characterize normal and abnormal network packet sequences. Our speci...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
80
Voted
COMPSEC
2002
185views more  COMPSEC 2002»
14 years 11 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
129
Voted
CAV
2011
Springer
216views Hardware» more  CAV 2011»
14 years 3 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song