Sciweavers

1587 search results - page 212 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
CSREASAM
2010
15 years 1 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
IEEEARES
2010
IEEE
15 years 12 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
160
Voted
WSNA
2003
ACM
15 years 10 months ago
MANTIS: system support for multimodAl NeTworks of in-situ sensors
The MANTIS MultimodAl system for NeTworks of In-situ wireless Sensors provides a new multithreaded embedded operating system integrated with a general-purpose single-board hardwar...
Hector Abrach, Shah Bhatti, James Carlson, Hui Dai...
158
Voted
MIDDLEWARE
2005
Springer
15 years 10 months ago
A reconfigurable group management middleware service for wireless sensor networks
Group management service plays a key role in wireless sensor networks (WSNs) as it provides support to high level middleware services such as object tracking, security, fault-tole...
Mardoqueu Vieira, Nelson Souto Rosa
138
Voted
LISA
2001
15 years 6 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman