Sciweavers

534 search results - page 75 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
IEEESP
2008
136views more  IEEESP 2008»
13 years 7 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
JNCA
2011
126views more  JNCA 2011»
13 years 2 months ago
Coordinated session-based admission control with statistical learning for multi-tier internet applications
Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. In this paper, we address the challengin...
Sireesha Muppala, Xiaobo Zhou
DSN
2009
IEEE
14 years 2 months ago
Intrusion-tolerant self-healing devices for critical infrastructure protection
Critical infrastructures like the power grid are essentially physical processes controlled by electronic devices. In the last decades, these electronic devices started to be contr...
Paulo Sousa, Alysson Neves Bessani, Wagner Saback ...
AINA
2005
IEEE
14 years 1 months ago
IEEE 802.11 MAC Protocol over Wireless Mesh Networks: Problems and Perspectives
The wireless mesh network has been an emerging technology in recent years. Because the transmission medium used in networking backhaul APs is radio, the wireless mesh network is n...
Tzu-Jane Tsai, Ju-Wei Chen
CRISIS
2009
13 years 5 months ago
A secured delegation of remote services on IPv6 home networks
IPv6 is an attractive technology for innovative services such as health care monitoring, alarm systems, peer to peer applications, virtual machine systems and so on. The generaliza...
Stere Preda, Laurent Toutain, Nora Cuppens-Boulahi...