Sciweavers

434 search results - page 63 / 87
» Addressing IT Security for Critical Control Systems
Sort
View
CORR
2008
Springer
84views Education» more  CORR 2008»
13 years 7 months ago
Small Is Not Always Beautiful
Peer-to-peer content distribution systems have been enjoying great popularity, and are now gaining momentum as a means of disseminating video streams over the Internet. In many of...
Pawel Marciniak, Nikitas Liogkas, Arnaud Legout, E...
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
13 years 8 months ago
Support vector machine classifiers for sequential decision problems
Classification problems in critical applications such as health care or security often require very high reliability because of the high costs of errors. In order to achieve this r...
Eladio Rodriguez Diaz, David A. Castaon
SP
2008
IEEE
119views Security Privacy» more  SP 2008»
14 years 2 months ago
Verifying the Safety of User Pointer Dereferences
Operating systems divide virtual memory addresses into kernel space and user space. The interface of a modern operating system consists of a set of system call procedures that may...
Suhabe Bugrara, Alex Aiken
SASO
2007
IEEE
14 years 1 months ago
Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT
Information systems form the backbones of the critical infrastructures of modern societies. Unfortunately, these systems are highly vulnerable to attacks that can result in enormo...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
ATAL
2003
Springer
13 years 11 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto