Sciweavers

18 search results - page 2 / 4
» Malicious Hubs: Detecting Abnormally Malicious Autonomous Sy...
Sort
View
WAC
2004
Springer
122views Communications» more  WAC 2004»
14 years 6 days ago
Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme
In this paper, we present a feedback-based system for managing trust and detecting malicious behavior in autonomically behaving networks. Like other distributed trust management sy...
Anurag Garg, Roberto Battiti, Gianni Costanzi
GPEM
2010
134views more  GPEM 2010»
13 years 5 months ago
An ensemble-based evolutionary framework for coping with distributed intrusion detection
A distributed data mining algorithm to improve the detection accuracy when classifying malicious or unauthorized network activity is presented. The algorithm is based on genetic p...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
HICSS
2002
IEEE
123views Biometrics» more  HICSS 2002»
13 years 11 months ago
On the Performance of a Survivability Architecture for Networked Computing Systems
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel...
William S. Harrison, Axel W. Krings, Nadine Hanebu...
MATA
2004
Springer
149views Communications» more  MATA 2004»
14 years 7 days ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 5 days ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan