Sciweavers

138 search results - page 16 / 28
» Damage control
Sort
View
CCS
2006
ACM
13 years 11 months ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...
IROS
2008
IEEE
98views Robotics» more  IROS 2008»
14 years 1 months ago
A scalable and distributed approach for self-assembly and self-healing of a differentiated shape
— As the ability to produce a large number of small, simple robotic agents improves, it becomes essential to control the behavior of these robots in such a way that the sum of th...
Michael Rubenstein, Wei-Min Shen
VIZSEC
2007
Springer
14 years 1 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
ERCIMDL
1998
Springer
133views Education» more  ERCIMDL 1998»
13 years 11 months ago
MarketNet: Using Virtual Currency to Protect Information Systems
This paper describes novel market-based technologies for systematic, quantifiable and predictable protection of information systems against attacks. These technologies, incorporate...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
ATAL
2008
Springer
13 years 9 months ago
A scalable and distributed model for self-organization and self-healing
As the ability to produce a large number of small, simple robotic agents improves, it becomes essential to control the behavior of these agents in such a way that the sum of their...
Michael Rubenstein, Wei-Min Shen