Sciweavers

2335 search results - page 315 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
AVI
2004
15 years 3 months ago
Visualizing programs with Jeliot 3
We present a program visualization tool called Jeliot 3 that is designed to aid novice students to learn procedural and object oriented programming. The key feature of Jeliot is t...
Andrés Moreno, Niko Myller, Erkki Sutinen, ...
NOMS
2002
IEEE
112views Communications» more  NOMS 2002»
15 years 6 months ago
Paradigms for mobile agent based active monitoring of network systems
We present here a framework together with a set of paradigms for mobile agent based active monitoring of network systems. In our framework mobile agents are used to perform remote...
Anand Tripathi, Tanvir Ahmed, Sumedh Pathak, Megan...
HPCC
2007
Springer
15 years 8 months ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
DSN
2011
IEEE
14 years 1 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
RECSYS
2009
ACM
15 years 6 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley