Sciweavers

217 search results - page 15 / 44
» Modeling a distributed intrusion detection system using coll...
Sort
View
ICDCSW
2007
IEEE
14 years 1 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
WWW
2004
ACM
14 years 8 months ago
Service Model for Collaborating Distributed Design and Manufacturing
This paper presents a Service-Oriented Process Model (SOM) to build a web-services based process management system, called MIDAS that would support distributed Design and Manufact...
Moon-Jung Chung, Woongsup Kim, Ravi Gopalan, Hong ...
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 7 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
WETICE
2005
IEEE
14 years 1 months ago
On P2P Collaboration Infrastructures
BSCW [8] and Groove [10] have become the two defacto standards for collaboration over the Internet. They offer a wealth of functionalities, support a variety of possible collabora...
Manfred Hauswirth, Ivana Podnar, Stefan Decker
RAID
1999
Springer
13 years 11 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield