Sciweavers

6907 search results - page 1154 / 1382
» Securing distributed adaptation
Sort
View
USS
2008
15 years 1 months ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach
ATAL
2008
Springer
15 years 1 months ago
CAMNEP: agent-based network intrusion detection system
We present a prototype of agent-based intrusion detection system designed for deployment on high-speed backbone networks. The main contribution of the system is the integration of...
Martin Rehák, Michal Pechoucek, Pavel Celed...
115
Voted
ATAL
2008
Springer
15 years 1 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
DLS
2005
101views Languages» more  DLS 2005»
15 years 1 months ago
Flexible object encapsulation for ambient-oriented programming
In the emerging field of Ambient Intelligence (AmI), software is deployed in wireless open networks of mobile devices. Such open networks require stringent security measures as u...
Wolfgang De Meuter, Éric Tanter, Stijn Most...
FC
2008
Springer
107views Cryptology» more  FC 2008»
15 years 25 days ago
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Abstract. We examine the structure and outcomes of user participation in PhishTank, a phishing-report collator. Anyone who wishes may submit URLs of suspected phishing websites, an...
Tyler Moore, Richard Clayton
« Prev « First page 1154 / 1382 Last » Next »