Sciweavers

551 search results - page 105 / 111
» Information searching and sharing in large-scale dynamic net...
Sort
View
CCS
2009
ACM
14 years 8 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
COMPGEOM
2004
ACM
14 years 1 months ago
Deformable spanners and applications
For a set S of points in Rd, an s-spanner is a graph on S such that any pair of points is connected via some path in the spanner whose total length is at most s times the Euclidea...
Jie Gao, Leonidas J. Guibas, An Nguyen
IDT
2010
138views more  IDT 2010»
13 years 6 months ago
Challenging computer software frontiers and the human resistance to change
This paper examines the driving and opposing forces that are governing the current paradigm shift from a data-processing information technology environment without software intell...
Jens Pohl
WWW
2011
ACM
13 years 2 months ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
APNOMS
2006
Springer
13 years 11 months ago
Signature-Aware Traffic Monitoring with IPFIX
Traffic monitoring is essential for accounting user traffic and detecting anomaly traffic such as Internet worms or P2P file sharing applications. Since typical Internet traffic mo...
Youngseok Lee, Seongho Shin, Taeck-Geun Kwon