Sciweavers

835 search results - page 46 / 167
» A calculus of challenges and responses
Sort
View
RFIDSEC
2010
13 years 7 months ago
Optimal Security Limits of RFID Distance Bounding Protocols
Abstract. In this paper, we classify the RFID distance bounding protocols having bitwise fast phases and no final signature. We also give the theoretical security bounds for two s...
Orhun Kara, Süleyman Kardas, Muhammed Ali Bin...
ICAC
2009
IEEE
14 years 3 months ago
Threat-model-driven runtime adaptation and evaluation of intrusion detection system
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is ...
Martin Rehák, Eugen Staab, Volker Fusenig, ...
IRI
2006
IEEE
14 years 3 months ago
Rapid systems of systems integration - combining an architecture-centric approach with enterprise service bus infrastructure
Rapid, yet methodical, systems of systems integration is in high demand. Application areas such as homeland security and disaster response add to the challenge because of a unique...
Ingolf Krüger, Michael Meisinger, Massimilian...
SIGUCCS
2003
ACM
14 years 2 months ago
Instructional support at small universities: a training perspective
This paper intends to present the challenges and opportunities encountered in technology training at small institutions using Trinity University as a case in point. During the cou...
Vidya Ananthanarayanan, Judith Reiffert
ATAL
2009
Springer
14 years 1 months ago
Dynamic information source selection for intrusion detection systems
Our work presents a mechanism designed for the selection of the optimal information provider in a multi-agent, heterogeneous and unsupervised monitoring system. The selfadaptation...
Martin Rehák, Eugen Staab, Michal Pechoucek...