Abstract— Detecting and unraveling incipient coordinated attacks on Internet resources requires a distributed network monitoring infrastructure. Such an infrastructure will have ...
We describe a scheme to fragment and distribute centralized databases. ’ The problem is motivated by trends towards down-sizing and reorganization, reflecting actual, often dist...
The widespread acceptance and uptake of Grid technology can only be achieved if it can be ensured that the security mechanisms needed to support Grid based collaborations are at l...
Richard O. Sinnott, A. J. Stell, David W. Chadwick...
Enterprise architecting is becoming critical for most modern organizations whose competitive strategies are tightly linked to the underlying information technology (IT) infrastruc...
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...