Sciweavers

762 search results - page 140 / 153
» Modeling and Simulating Information Security Management
Sort
View
WCNC
2010
IEEE
13 years 11 months ago
MUTON: Detecting Malicious Nodes in Disruption-Tolerant Networks
—The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the ...
Yanzhi Ren, Mooi Choo Chuah, Jie Yang, Yingying Ch...
KESAMSTA
2009
Springer
14 years 6 days ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial
IAT
2008
IEEE
14 years 2 months ago
Intent-Driven Insider Threat Detection in Intelligence Analyses
In intelligence analysis, information plays an important role in solving problems and making decisions. However, an increasing number of malicious behaviors, most of which come fr...
Eugene Santos Jr., Hien Nguyen, Fei Yu, Keum Joo K...
ICDIM
2007
IEEE
14 years 1 months ago
Remote instrument control with CIMA Web services and Web 2.0 technology
—The Common Instrument Middleware Architecture (CIMA) model for Web services based monitoring of remote scientific instruments is being extended and enhanced to provide a capabil...
Douglas du Boulay, Clinton Chee, Kenneth Chiu, Ric...
CIT
2007
Springer
14 years 1 months ago
An 802.11 Based MAC Protocol for Providing QoS to Real Time Applications
IEEE 802.11 based wireless LANs (WLAN) are ubiquitous nowadays. Running real time voice and video applications over LANs is becoming common place. These applications require QoS i...
Mayank Mishra, Anirudha Sahoo