Sciweavers

295 search results - page 42 / 59
» An Approach to Trust Management Challenges for Critical Infr...
Sort
View
CN
2007
90views more  CN 2007»
13 years 7 months ago
Distributed on-demand routing for LEO satellite systems
Notwithstanding the limited commercial success of the first narrowband Low Earth Orbit (LEO) satellite systems, the interest of the scientific community in this type of systems ...
Evangelos Papapetrou, Stylianos Karapantazis, Foti...
ACSAC
2004
IEEE
13 years 11 months ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee
JSAC
2007
93views more  JSAC 2007»
13 years 7 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...
ICSOC
2010
Springer
13 years 6 months ago
A Programmble Fault Injection Testbed Generator for SOA
In this demo paper we present the prototype of our fault injection testbed generator. Our tool empowers engineers to generate emulated SOA environments and to program fault injecti...
Lukasz Juszczyk, Schahram Dustdar
IWCMC
2006
ACM
14 years 1 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras