Sciweavers

150 search results - page 25 / 30
» Agent-Based Network Protection Against Malicious Code
Sort
View
CCGRID
2005
IEEE
14 years 1 months ago
Instant attack stopper in InfiniBand architecture
With the growing popularity of cluster architectures in datacenters and the sophistication of computer attacks, the design of highly secure clusters has recently emerged as a crit...
Manhee Lee, Mazin S. Yousif
CCS
2006
ACM
13 years 11 months ago
Can machine learning be secure?
Machine learning systems offer unparalled flexibility in dealing with evolving input in a variety of applications, such as intrusion detection systems and spam e-mail filtering. H...
Marco Barreno, Blaine Nelson, Russell Sears, Antho...
CCS
2005
ACM
14 years 28 days ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
DRM
2006
Springer
13 years 11 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
WD
2010
13 years 5 months ago
Enhancing FEC application in LTE cellular networks
3rd Generation Partnership Project's (3GPP) Long Term Evolution (LTE) is focused on enhancing the Universal Terrestrial Radio Access (UTRA). Evolved-Multimedia Broadcast and M...
Antonios G. Alexiou, Christos Bouras, Vasileios Ko...