Sciweavers

2269 search results - page 403 / 454
» Behavioral Intrusion Detection
Sort
View
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
14 years 3 months ago
Functional Coverage Driven Test Generation for Validation of Pipelined Processors
Functional verification of microprocessors is one of the most complex and expensive tasks in the current system-on-chip design process. A significant bottleneck in the validatio...
Prabhat Mishra, Nikil D. Dutt
INFOCOM
2005
IEEE
14 years 3 months ago
The effect of DNS delays on worm propagation in an IPv6 Internet
— It is a commonly held belief that IPv6 provides greater security against random-scanning worms by virtue of a very sparse address space. We show that an intelligent worm can ex...
Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos ...
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 3 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...
ITCC
2005
IEEE
14 years 3 months ago
Protecting On-Line Casinos against Fraudulent Player Drop-Out
Some multiplayer, on-line games rely on the collaboration of all participating players. If a player’s gamble is aborted, the rest of players cannot continue playing. This behavi...
Joaquín García, Frédér...
WECWIS
2005
IEEE
142views ECommerce» more  WECWIS 2005»
14 years 3 months ago
Implementing Web Service Protocols in SOA: WS-Coordination and WS-BusinessActivity
Web Service protocol standards should be unambiguous and provide a complete description of the allowed behavior of the protocols’ participants. Implementation of such protocols ...
Friedrich H. Vogt, Simon Zambrovski, Boris Gruschk...