Sciweavers

6689 search results - page 123 / 1338
» A Network Security Monitor
Sort
View
ICTAI
2005
IEEE
14 years 3 months ago
A Dynamic Bayesian Network for Handling Uncertainty in a Decision Support System Adapted to the Monitoring of Patients Treated b
Telemedicine is a mean of facilitating the distribution of human resources and professional competences. It can speed up diagnosis and therapeutic care delivery and allow peripher...
Cédric Rose, Cherif Smaili, François...
JCS
2008
124views more  JCS 2008»
13 years 10 months ago
Securing information flow via dynamic capture of dependencies
Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
Paritosh Shroff, Scott F. Smith, Mark Thober
CSREASAM
2006
13 years 11 months ago
Increasing Security in Mobile Ad Hoc Networks by Incentives to Cooperate and Secure Routing
A mobile ad hoc network is a self-organizing network that relies on the cooperation of participating nodes in order to function properly. In this network, mobile users arrive withi...
Ebrahim Khosravi, Brandy Tyson
ACSAC
1999
IEEE
14 years 2 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
ICDCS
2007
IEEE
14 years 1 months ago
Communication-Efficient Tracking of Distributed Cumulative Triggers
In recent work, we proposed D-Trigger, a framework for tracking a global condition over a large network that allows us to detect anomalies while only collecting a very limited amo...
Ling Huang, Minos N. Garofalakis, Anthony D. Josep...