Sciweavers

530 search results - page 85 / 106
» Security Analysis of Open Building Automation Systems
Sort
View
JSS
2011
126views more  JSS 2011»
14 years 16 days ago
A novel statistical time-series pattern based interval forecasting strategy for activity durations in workflow systems
Forecasting workflow activity durations is of great importance to support satisfactory QoS in workflow systems. Traditionally, a workflow system is often designed to facilitate the...
Xiao Liu, Zhiwei Ni, Dong Yuan, Yuan-Chun Jiang, Z...
WISEC
2010
ACM
15 years 4 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
78
Voted
CCS
2003
ACM
15 years 2 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
USENIX
2007
15 years 6 hour ago
Reboots Are for Hardware: Challenges and Solutions to Updating an Operating System on the Fly
Patches to modern operating systems, including bug fixes and security updates, and the reboots and downtime they require, cause tremendous problems for system users and administr...
Andrew Baumann, Jonathan Appavoo, Robert W. Wisnie...
DSN
2011
IEEE
13 years 9 months ago
OS diversity for intrusion tolerance: Myth or reality?
—One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are ...
Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, ...