Sciweavers

93 search results - page 15 / 19
» A Diagrammatical Framework for Information Systems Attacks
Sort
View
DOA
2001
94views more  DOA 2001»
13 years 8 months ago
How to Monitor and Control Resource Usage in Mobile Agent Systems
The Mobile Agent technology has already shown its advantages, but at the same time has already remarked new problems currently limiting its diffusion in commercial environments. A...
Paolo Bellavista, Antonio Corradi, Cesare Stefanel...
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
14 years 1 months ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm
EDBT
2010
ACM
156views Database» more  EDBT 2010»
13 years 10 months ago
Pattern detector: fast detection of suspicious stream patterns for immediate reaction
Detecting emerging problems in information and manufacturing systems is the goal of monitoring tools. Good and timely detection of problematic conditions from measured indicators ...
Ira Assent, Hardy Kremer, Stephan Günnemann, ...
IJNSEC
2008
150views more  IJNSEC 2008»
13 years 7 months ago
Tamper Resistant Software Through Intent Protection
One approach to protect distributed systems implemented with mobile code is through program obfuscation. Disguising program intent is a form of information hiding that facilitates...
Alec Yasinsac, J. Todd McDonald
CCS
2008
ACM
13 years 9 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...