Sciweavers

971 search results - page 142 / 195
» Autonomic Intrusion Detection System
Sort
View
SECURWARE
2007
IEEE
14 years 3 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
ACSAC
2005
IEEE
14 years 2 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
IAT
2007
IEEE
14 years 3 months ago
Economically Inspired Self-healing Model for Multi-Agent Systems
Self-healing in fault tolerant multi-agent systems is the system ability to automatically detect, diagnose, and repair the faults. However, most of the available solutions are fra...
Maryam Ashoori, Chunyan Miao, Majid Nili, Mehdi Am...
ACOM
2006
Springer
14 years 2 months ago
Using Social Commitments to Control the Agents' Freedom of Speech
Communication is essential in multi-agent systems, since it allows agents to share knowledge and to coordinate. However, in open multi-agent systems, autonomous and heterogeneous a...
Guillaume Muller, Laurent Vercouter
SIGOPSE
2000
ACM
14 years 1 months ago
Deferring trust in fluid replication
Mobile nodes rely on external services to provide safety, sharing, and additional resources. Unfortunately, as mobile nodes move through the networking infrastructure, the costs o...
Brian D. Noble, Ben Fleis, Landon P. Cox