Sciweavers

6689 search results - page 73 / 1338
» A Network Security Monitor
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
Discovering Topologies at Router Level: Part II
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...
BROADNETS
2004
IEEE
14 years 18 days ago
Wireless Sensor Network for Aircraft Health Monitoring
Wireless Sensor networks is an emerging paradigm of computing and networking where a node may be selfpowered, and have sensing, computing, and communication capabilities. They hav...
Haowei Bai, Mohammed Atiquzzaman, David J. Lilja
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
14 years 18 days ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
IJNSEC
2008
129views more  IJNSEC 2008»
13 years 8 months ago
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...