Sciweavers

792 search results - page 128 / 159
» Mixed-initiative security agents
Sort
View
MONET
2011
13 years 2 months ago
Jamming in Wireless Networks Under Uncertainty
— The problem of jamming plays an important role in ensuring the quality and security of wireless communications, especially at this moment when wireless networks are quickly bec...
Eitan Altman, Konstantin Avrachenkov, Andrey Garna...
ICS
2003
Tsinghua U.
14 years 27 days ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
IEEEARES
2008
IEEE
14 years 2 months ago
Application-Oriented Trust in Distributed Computing
Preserving integrity of applications being executed in remote machines is an open problem. Integrity requires that application code is not tampered with, prior to or during execut...
Riccardo Scandariato, Yoram Ofek, Paolo Falcarin, ...
CSFW
2003
IEEE
14 years 1 months ago
Anonymity and Information Hiding in Multiagent Systems
We provide a framework for reasoning about information-hiding requirements in multiagent systems and for reasoning about anonymity in particular. Our framework employs the modal l...
Joseph Y. Halpern, Kevin R. O'Neill
WETICE
2002
IEEE
14 years 18 days ago
Honeypots for Distributed Denial of Service Attacks
Distributed Denial-of-Service attacks are still a big threat to the Internet. Several proposals for coping with the attacks have been made in the recent past, but neither of them ...
Nathalie Weiler