Sciweavers

971 search results - page 105 / 195
» Autonomic Intrusion Detection System
Sort
View
MADNES
2005
Springer
14 years 2 months ago
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis
RAID
1999
Springer
14 years 1 months ago
IDS Standards: Lessons Learned to Date
: I will discuss two efforts to get Intrusion Detection Systems to work together - the Common Intrusion Detection Framework (CIDF), and the IETF's working group to develop an ...
Stuart Staniford-Chen
ACSD
2006
IEEE
154views Hardware» more  ACSD 2006»
14 years 2 months ago
Concurrency in Distributed Systems under Autonomous and Enforced Actions
Recently, the formal approach of I–Systems has been newly hed through an abstract axiomatic system where events in system components are solely derived and defined from their b...
Arnim Wedig, Horst F. Wedde, Anca M. Lazarescu, El...
WAC
2004
Springer
122views Communications» more  WAC 2004»
14 years 2 months ago
Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme
In this paper, we present a feedback-based system for managing trust and detecting malicious behavior in autonomically behaving networks. Like other distributed trust management sy...
Anurag Garg, Roberto Battiti, Gianni Costanzi
FCCM
2008
IEEE
133views VLSI» more  FCCM 2008»
14 years 3 months ago
Autonomous System on a Chip Adaptation through Partial Runtime Reconfiguration
This paper presents a proto-type autonomous signal processing system on a chip. The system is architected such that high performance digital signal processing occurs in the FPGA...
Matthew French, Erik Anderson, Dong-In Kang