Sciweavers

1748 search results - page 211 / 350
» Security Models for Heterogeneous Networking
Sort
View
COLCOM
2005
IEEE
15 years 9 months ago
Matching distributed systems to their environment using dissipative structures
In contrast to a large body of theoretical work on computer systems, distributed systems are not idealised constructions, unconstrained by physical world limitations. They must be...
Jim Dowling, Dominik Dahlem, Jan Sacha
CCS
2003
ACM
15 years 9 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
115
Voted
ISPEC
2007
Springer
15 years 10 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
COMPSEC
2006
97views more  COMPSEC 2006»
15 years 3 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar
ISI
2008
Springer
15 years 3 months ago
Intrusion activity projection for cyber situational awareness
Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....