Sciweavers

5665 search results - page 137 / 1133
» Introduction to Computer Security
Sort
View
ICDCSW
2008
IEEE
14 years 3 months ago
Secure Control: Towards Survivable Cyber-Physical Systems
In this position paper we investigate the security of cyberphysical systems. We (1) identify and define the problem of secure control, (2) investigate the defenses that informati...
Alvaro A. Cárdenas, Saurabh Amin, Shankar S...
GI
2005
Springer
14 years 2 months ago
On the Coverage of Proactive Security: An Addition to the Taxonomy of Faults
: Intrusion tolerance is a recent approach to deal with intentional and malicious failures. It combines the research on fault tolerance with the research on security, and relies on...
Timo Warns
COMPUTER
2006
61views more  COMPUTER 2006»
13 years 9 months ago
Designing an Integrated Architecture for Network Content Security Gateways
Ying-Dar Lin, Chih-Wei Jan, Po-Ching Lin, Yuan-Che...
IPPS
2008
IEEE
14 years 3 months ago
Providing flow based performance guarantees for buffered crossbar switches
Buffered crossbar switches are a special type of combined input-output queued switches with each crosspoint of the crossbar having small on-chip buffers. The introduction of cross...
Deng Pan, Yuanyuan Yang
ICDCS
2006
IEEE
14 years 3 months ago
DNScup: Strong Cache Consistency Protocol for DNS
Effective caching in Domain Name System (DNS) is critical to its performance and scalability. Existing DNS only supports weak cache consistency by using the Time-To-Live (TTL) mec...
Xin Chen, Haining Wang, Shansi Ren