Sciweavers

14824 search results - page 2620 / 2965
» Security - Introduction
Sort
View
136
Voted
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
15 years 8 months ago
Estimating the Actual Cost of Transmission System Congestion
This paper describes a methodology that could be used by a utility to estimate the actual cost of congestion on its transmission system using limited, non-state estimator data. Th...
Thomas J. Overbye
123
Voted
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 8 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
149
Voted
IAW
2003
IEEE
15 years 8 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
ICDCS
2003
IEEE
15 years 8 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
120
Voted
ICEIS
2003
IEEE
15 years 8 months ago
Toxic Farm: A Cooperative Management Platform for Virtual Teams and Enterprises
: The proliferation of the Internet has revolutionized the way people work together for business. People located at remote places can collaborate across organizational and national...
Hala Skaf-Molli, Pascal Molli, Gérald Oster...
« Prev « First page 2620 / 2965 Last » Next »