Sciweavers

6689 search results - page 43 / 1338
» A Network Security Monitor
Sort
View
OOPSLA
2007
Springer
14 years 1 months ago
Making trace monitors feasible
Pavel Avgustinov, Julian Tibble, Oege de Moor
CCS
2010
ACM
14 years 12 days ago
Preventing drive-by download via inter-module communication monitoring
Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Y...
HAIS
2008
Springer
13 years 8 months ago
Multi-agent System for Management and Monitoring of Routes Surveillance
This paper presents a multi-agent system for security control on industrial environments. The system uses a set of wireless technologies and software agents which integrate reasoni...
Sara Rodríguez, Javier Bajo
HOTNETS
2010
13 years 2 months ago
How to tell an airport from a home: techniques and applications
Today's Internet services increasingly use IP-based geolocation to specialize the content and service provisioning for each user. However, these systems focus almost exclusiv...
Andreas Pitsillidis, Yinglian Xie, Fang Yu, Mart&i...
DSN
2004
IEEE
13 years 11 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra