Sciweavers

3349 search results - page 536 / 670
» Data Security
Sort
View
122
Voted
COMPSEC
2004
91views more  COMPSEC 2004»
15 years 2 months ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
134
Voted
SAC
2002
ACM
15 years 2 months ago
Agent factory: generative migration of mobile agents in heterogeneous environments
In most of today's agent systems migration of agents requires homogeneity in the programming language and/or agent platform in which an agent has been designed. In this paper...
Frances M. T. Brazier, Benno J. Overeinder, Maarte...
122
Voted
ICRA
2010
IEEE
195views Robotics» more  ICRA 2010»
15 years 1 months ago
Cooperative tracking of moving objects and face detection with a dual camera sensor
— This paper describes a sensor for autonomous surveillance capable of continuously monitoring the environment, while acquiring detailed images of specific areas. This is achiev...
Stefano Ghidoni, Alberto Pretto, Emanuele Menegatt...
195
Voted
LATINCRYPT
2010
15 years 1 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
134
Voted
TDSC
2010
102views more  TDSC 2010»
15 years 1 months ago
A Survey on the Encryption of Convergecast Traffic with In-Network Processing
—We present an overview of end-to-end encryption solutions for convergecast traffic in wireless sensor networks that support in-network processing at forwarding intermediate node...
Steffen Peter, Dirk Westhoff, Claude Castelluccia