Sciweavers

14824 search results - page 2910 / 2965
» Security - Introduction
Sort
View
CASCON
2006
131views Education» more  CASCON 2006»
15 years 11 days ago
STAC: software tuning panels for autonomic control
One aspect of autonomic computing is the ability to identify, separate and automatically tune parameters related to performance, security, robustness and other properties of a sof...
Elizabeth Dancy, James R. Cordy
CSREASAM
2006
15 years 11 days ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
DIMVA
2004
15 years 11 days ago
Sensors for Detection of Misbehaving Nodes in MANETs
: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
EVOTING
2004
100views Hardware» more  EVOTING 2004»
15 years 10 days ago
E-Democracy in E-Austria
Abstract: Christian Rupp has been appointed Federal Executive Secretary of EGovernment in May of 2003. At that point of time a new E-Government Platform was introduced. He reports ...
Christian Rupp
DMIN
2006
111views Data Mining» more  DMIN 2006»
15 years 10 days ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
« Prev « First page 2910 / 2965 Last » Next »