Sciweavers

529 search results - page 60 / 106
» Model checking detectability of attacks in multiagent system...
Sort
View
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 7 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
FASE
2004
Springer
14 years 1 months ago
Checking Absence of Illicit Applet Interactions: A Case Study
Abstract. This paper presents the use of a method – and its corresponding tool set – for compositional verification of applet interactions on a realistic industrial smart card...
Marieke Huisman, Dilian Gurov, Christoph Sprenger,...
ISMAR
2007
IEEE
14 years 1 months ago
An Industrial Augmented Reality Solution For Discrepancy Check
Construction companies employ CAD software during the planning phase, but what is finally built often does not match the original plan. The procedure of validating the model is c...
Pierre Georgel, Pierre Schroeder, Selim Benhimane,...
INFOCOM
2005
IEEE
14 years 1 months ago
Reduction of quality (RoQ) attacks on Internet end-systems
— Current computing systems depend on adaptation mechanisms to ensure that they remain in quiescent operating regions. These regions are often defined using efficiency, fairnes...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
CL
2002
Springer
13 years 7 months ago
Behavioural typing for safe ambients
We introduce a typed variant of Safe Ambients, named Secure Safe Ambients (SSA), whose type system allows behavioral invariants of ambients to be expressed and verified. The most ...
Michele Bugliesi, Giuseppe Castagna