Sciweavers

359 search results - page 34 / 72
» An Architecture for Intrusion Detection Using Autonomous Age...
Sort
View
FTDCS
1997
IEEE
13 years 12 months ago
Distributed Transaction Processing as a Reliability Concept for Mobile Agents
Mobile agents offer a new possibility for the development of applications in distributed systems and are no longer a theoretical issue since different architectures for their impl...
Hartmut Vogler, Thomas Kunkelmann, Marie-Luise Mos...
RAID
2004
Springer
14 years 1 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
MATA
2004
Springer
149views Communications» more  MATA 2004»
14 years 1 months ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
ACSAC
2008
IEEE
14 years 2 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
MA
2000
Springer
99views Communications» more  MA 2000»
13 years 11 months ago
Multiple Agent-Based Autonomy for Satellite Constellations
Multiple, highly autonomous, satellite systems are envisioned in the near future because they are capable of higher performance, lower cost, better fault tolerance, reconfigurabil...
Thomas P. Schetter, Mark E. Campbell, Derek M. Sur...