Sciweavers

1154 search results - page 4 / 231
» Making Self-organizing Systems Secure
Sort
View
COMSWARE
2007
IEEE
14 years 4 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
SASO
2007
IEEE
14 years 4 months ago
Adaptive SSL: Design, Implementation and Overhead Analysis
Adaptive security is based on the observation that the security requirements of a system or service heavily depend on the environment in which they operate and should therefore be...
Christiaan J. Lamprecht, Aad P. A. van Moorsel
SASO
2008
IEEE
14 years 4 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
ACMSE
2006
ACM
13 years 11 months ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
14 years 3 months ago
A Two-Level Approach to Making Class Predictions
In this paper we propose a new two-level methodology for assessing countries’/companies’ economic/financial performance. The methodology is based on two major techniques of gr...
Adrian Costea, Tomas Eklund