Sciweavers

6689 search results - page 91 / 1338
» A Network Security Monitor
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 1 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
CCR
2007
135views more  CCR 2007»
13 years 9 months ago
Future internet: fundamentals and measurement
While the Internet is hardly “broken”, it has proved unable to integrate new ideas, new architectures, and provide paths for future integration of data, voice, rich media and ...
Thrasyvoulos Spyropoulos, Serge Fdida, Scott Kirkp...
RAID
2001
Springer
14 years 1 months ago
System Health and Intrusion Monitoring Using a Hierarchy of Constraints
Calvin Ko, Paul Brutch, Jeff Rowe, Guy Tsafnat, Ka...
CONEXT
2008
ACM
13 years 10 months ago
Distributed scheduling in large scale monitoring infrastructures
Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gian...
MATA
2001
Springer
177views Communications» more  MATA 2001»
14 years 1 months ago
A Self-adaptable Agent System for Efficient Information Gathering
As networks become all-pervasive the importance of efficient information gathering for purposes such as monitoring, fault diagnosis, and performance evaluation can only increase. E...
Antonio Liotta, George Pavlou, Graham Knight