Sciweavers

6907 search results - page 225 / 1382
» Securing distributed adaptation
Sort
View
COMPENG
2010
178views Algorithms» more  COMPENG 2010»
14 years 11 months ago
Online Distributed Interdependency Estimation with Partial Information Sharing
Infrastructures are becoming more and more interoperable, while stakeholders are not aware of the overall behavior. In order achieve a global awareness, in this paper the need for ...
Andrea Gasparri, Francesco Iovino, Gabriele Oliva,...
129
Voted
CCS
2007
ACM
15 years 10 months ago
Fuzzy extractors for continuous distributions
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
WETICE
2002
IEEE
15 years 9 months ago
Honeypots for Distributed Denial of Service Attacks
Distributed Denial-of-Service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them ...
Nathalie Weiler
130
Voted
BCS
2008
15 years 5 months ago
Distributed Defence Against Denial of Service Attacks: A Practical View
In recent years, Denial of Service attacks have evolved into a predominant network security threat. In our previous work, we identified the necessary building blocks for an effect...
Gülay Öke, Georgios Loukas
WEBNET
2001
15 years 5 months ago
Managing Distributed Personal Firewalls with Smart Data Servers
: Modern security architectures tend to become more and more complex. Not only the chances to improve Web applications using several data channels and diverse (TCP-)ports are very ...
Ernst Georg Haffner, Uwe Roth, Andreas Heuer 0002,...