Sciweavers

1191 search results - page 64 / 239
» Distributed Detection of Information Flows
Sort
View
NOSSDAV
2005
Springer
14 years 2 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
DBSEC
2006
115views Database» more  DBSEC 2006»
13 years 10 months ago
Creating Objects in the Flexible Authorization Framework
Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not ...
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
DEBS
2010
ACM
13 years 5 months ago
Mobile XSiena: towards mobile publish/subscribe
Mobile XSiena is a novel publish/subscribe platform which seeks to extend the XSiena content-based publish/subscribe system in order to support user mobility and create an experim...
Zigor Salvador, Aurkene Alzua, Mikel Larrea, Alber...
CIA
2007
Springer
14 years 3 months ago
High-Performance Agent System for Intrusion Detection in Backbone Networks
Abstract. This paper presents a design of high-performance agentbased intrusion detection system designed for deployment on high-speed network links. To match the speed requirement...
Martin Rehák, Michal Pechoucek, Pavel Celed...
ICON
2007
IEEE
14 years 3 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...