Sciweavers

2560 search results - page 407 / 512
» Securing VO Management
Sort
View
CACM
2004
212views more  CACM 2004»
15 years 4 months ago
The Spinning Cube of Potential Doom
Darknets are often proposed to monitor for anomalous, externally sourced traffic, and require large, contiguous blocks of unused IP addresses - not always feasible for enterprise ...
Stephen Lau
CAD
2000
Springer
15 years 4 months ago
Lessons learned developing protocols for the industrial virtual enterprise
The protocols selected and developed by the NIIIP Consortium have been validated in three end-of-cycle demonstrations. In each cycle, a team with expertise in technical product da...
Martin Hardwick, K. C. Morris, David L. Spooner, T...
COMCOM
2007
156views more  COMCOM 2007»
15 years 4 months ago
A survey on clustering algorithms for wireless sensor networks
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as disaster management, combat field reconnaissa...
Ameer Ahmed Abbasi, Mohamed F. Younis
RAID
2010
Springer
15 years 2 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
IEAAIE
2010
Springer
15 years 2 months ago
Temporal Bounded Planner Agent for Dynamic Industrial Environments
This paper presents a time bounded real-time agent, the core of a Multi-agent System aimed at managing the security in manufacturing environments, where time constraints are a key ...
Juan Francisco de Paz, Martí Navarro, Sara ...