Sciweavers

137 search results - page 12 / 28
» A Host Intrusion Prevention System for Windows Operating Sys...
Sort
View
MSWIM
2005
ACM
14 years 1 months ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
IPPS
2006
IEEE
14 years 1 months ago
Network intrusion detection with semantics-aware capability
Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we propose a network intrusion detectio...
Walter J. Scheirer, Mooi Choo Chuah
LISA
2004
13 years 9 months ago
Solaris Zones: Operating System Support for Consolidating Commercial Workloads
Server consolidation, which allows multiple workloads to run on the same system, has become increasingly important as a way to improve the utilization of computing resources and r...
Daniel Price, Andrew Tucker
JIPS
2007
223views more  JIPS 2007»
13 years 7 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
ACSAC
2000
IEEE
13 years 12 months ago
Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness
In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti