Sciweavers

3451 search results - page 6 / 691
» Collaborative attack modeling
Sort
View
DSOM
2008
Springer
13 years 9 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...
ACSAC
2009
IEEE
14 years 2 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
OTM
2009
Springer
14 years 2 months ago
An Architecture for Dynamic Trust Monitoring in Mobile Networks
Collusion attacks remain a major problem of reputation and trust models, in mobile ad hoc networks. By covering up malicious behaviour of one another from the remaining part of the...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
CSE
2009
IEEE
14 years 2 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
ICDM
2005
IEEE
126views Data Mining» more  ICDM 2005»
14 years 1 months ago
Segment-Based Injection Attacks against Collaborative Filtering Recommender Systems
Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. Researchers have shown that attackers can manipulate a system’s reco...
Robin D. Burke, Bamshad Mobasher, Runa Bhaumik, Ch...