Sciweavers

182 search results - page 27 / 37
» Combined Execution and Monitoring for Control of Autonomous ...
Sort
View
RAID
2007
Springer
14 years 1 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
RAID
2010
Springer
13 years 6 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
IJCSA
2007
130views more  IJCSA 2007»
13 years 7 months ago
Purposeful Deployment via Self-Organizing Flocking Coalition in Sensor Networks
This paper presents a deployment strategy via self organizing flocking coalitions for mobile sensor network coverage. The concepts of our approach are inspired by the flocking phe...
Yee Ming Chen, Shu-Hao Chang
NCA
2007
IEEE
14 years 1 months ago
FRAC: Implementing Role-Based Access Control for Network File Systems
We present FRAC, a Framework for Role-based Access Control in network file systems. FRAC is a reference monitor that controls the message flow between file system clients and s...
Aniruddha Bohra, Stephen Smaldone, Liviu Iftode
ISEM
2006
167views more  ISEM 2006»
13 years 7 months ago
Agent-based workflow management systems (WfMSs)
Workflow management systems (WfMS) based on agent technology can cope with the rapidly evolving business environment better than most other systems as they are more flexible and op...
Lars Ehrler, Martin K. Fleurke, Maryam Purvis, Bas...