Sciweavers

2281 search results - page 92 / 457
» Security Patterns and Secure Systems Design
Sort
View
LISA
2004
15 years 1 months ago
Making a Game of Network Security
This paper describes our experiences in the design and implementation of a network for security training exercises, and one such exercise. The network described herein is flexible...
Marc Dougherty
122
Voted
MM
2003
ACM
262views Multimedia» more  MM 2003»
15 years 5 months ago
ARMS: adaptive rich media secure streaming
In this demonstration we present the ARMS system which enables secure and adaptive rich media streaming to a large-scale, heterogeneous client population. The ARMS system dynamica...
Lisa Amini, Raymond Rose, Chitra Venkatramani, Oli...
WISA
2007
Springer
15 years 6 months ago
Detecting Motifs in System Call Sequences
The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pat...
William O. Wilson, Jan Feyereisl, Uwe Aickelin
CHI
2010
ACM
15 years 3 months ago
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices
Implantable medical devices (IMDs) improve patients' quality of life and help sustain their lives. In this study, we explore patient views and values regarding their devices ...
Tamara Denning, Alan Borning, Batya Friedman, Bria...
JNW
2006
142views more  JNW 2006»
15 years 12 days ago
Incorruptible Self-Cleansing Intrusion Tolerance and Its Application to DNS Security
Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The trend lends importance to the concept of intrusion tolerance: there is...
Yih Huang, David Arsenault, Arun Sood