Sciweavers

1737 search results - page 81 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
TEC
2002
166views more  TEC 2002»
14 years 11 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
CCR
1998
75views more  CCR 1998»
14 years 11 months ago
A comparative analysis of groupware application protocols
Two of the most difficult problems faced by developers of synchronous groupware applications are the handling of multiple session connections and the maintenance of replicated dat...
Mark Pendergast
KDD
2009
ACM
166views Data Mining» more  KDD 2009»
16 years 12 days ago
Measuring the effects of preprocessing decisions and network forces in dynamic network analysis
Social networks have become a major focus of research in recent years, initially directed towards static networks but increasingly, towards dynamic ones. In this paper, we investi...
Jerry Scripps, Pang-Ning Tan, Abdol-Hossein Esfaha...
NDSS
1997
IEEE
15 years 4 months ago
Probable Plaintext Cryptanalysis of the IP Security Protocols
The Internet Engineering Task Force (IETF) is in the process of adopting standards for IP-layer encryption and authentication (IPSEC). We describe how “probable plaintext” can...
Steven M. Bellovin
143
Voted
CONEXT
2009
ACM
15 years 29 days ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...