Sciweavers

425 search results - page 56 / 85
» Audit
Sort
View
LCN
2008
IEEE
14 years 1 months ago
Managing energy use in a network with a new SNMP Power State MIB
— Energy consumption has become a major factor in the total cost of ownership (TCO) of IT equipment. The power state of IT equipment is effectively “invisible” to the network...
Francisco Blanquicet, Kenneth J. Christensen
SADFE
2008
IEEE
14 years 1 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo
AINA
2007
IEEE
14 years 1 months ago
Detecting Coordinated Distributed Multiple Attacks
This paper describes results concerning the robustness and generalization capabilities of kernel methods in detecting coordinated distributed multiple attacks (CDMA) using network...
Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Ba...
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 1 months ago
The Rigorous Implementation of a Fair Exchange Protocol for Non-repudiable Web Service Interactions - a case study
The correct implementation of security protocols is a challenging task. To achieve a high degree of confidence in an implementation, as with any software, ideally one requires bot...
Nick Cook, Paul Robinson, Santosh K. Shrivastava
ICNP
2007
IEEE
14 years 1 months ago
Loss and Delay Accountability for the Internet
— The Internet provides no information on the fate of transmitted packets, and end systems cannot determine who is responsible for dropping or delaying their traffic. As a resul...
Katerina J. Argyraki, Petros Maniatis, O. Irzak, S...