Sciweavers

1061 search results - page 2 / 213
» Experiences with Honeypot Systems: Development, Deployment, ...
Sort
View
JCP
2007
127views more  JCP 2007»
13 years 7 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong
AINA
2008
IEEE
14 years 2 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar
TJS
2002
118views more  TJS 2002»
13 years 7 months ago
On the Design, Development, Deployment, and Network Survivability Analysis of the Dynamic Routing System Protocol
: With the ever-increasing demands on server applications, reliability is of paramount importance. Often these services are implemented using a distributed server cluster architect...
Abdur Chowdhury, Ophir Frieder, Peng-Jun Wan
IJCIS
2000
106views more  IJCIS 2000»
13 years 7 months ago
Agents in Overalls: Experiences and Issues in the Development and Deployment of Industrial Agent-Based Systems
Agent technologies have steadily matured in moving from the research laboratory to industrial application over the last ten years. Numerous systems have been deployed or are under...
H. Van Dyke Parunak
CORR
2011
Springer
241views Education» more  CORR 2011»
12 years 11 months ago
An Agent-based Strategy for Deploying Analysis Models into Specification and Design for Distributed APS Systems
Despite the extensive use of the agent technology in the Supply Chain Management field, its integration with Advanced Planning and Scheduling (APS) tools still represents a promis...
Luis Antonio de Santa-Eulalia, Sophie D'Amours, Je...