Sciweavers

44 search results - page 9 / 9
» Evaluating the Impact of Automated Intrusion Response Mechan...
Sort
View
SENSYS
2003
ACM
14 years 6 days ago
CODA: congestion detection and avoidance in sensor networks
Event-driven sensor networks operate under an idle or light load and then suddenly become active in response to a detected or monitored event. The transport of event impulses is l...
Chieh-Yih Wan, Shane B. Eisenman, Andrew T. Campbe...
WSC
2000
13 years 8 months ago
Anticipatory Planning Support System
A new approach to military operations, called Anticipatory Planning and Adaptive Execution, treats planning and execution as a tightly coupled, single process, and replaces reacti...
John R. Surdu, John M. D. Hill, Udo W. Pooch
ISSTA
2010
ACM
13 years 11 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan