Sciweavers

6199 search results - page 129 / 1240
» Monitoring the
Sort
View
DSN
2008
IEEE
15 years 11 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
HICSS
2008
IEEE
172views Biometrics» more  HICSS 2008»
15 years 11 months ago
Semantic Web Services Monitoring: An OWL-S Based Approach
In this paper we describe mechanisms for execution monitoring of semantic web services, based on OWL-S. The use of semantic descriptions and ontologies is a valuable extension to ...
Roman Vaculín, Katia P. Sycara
ICCCN
2008
IEEE
15 years 11 months ago
Sources and Monitors: A Trust Model for Peer-to-Peer Networks
—In this paper, we introduce an objective model of trust in peer-to-peer networks. Based on this model, we develop protocols that can be used by the peers in a peer-to-peer netwo...
Yan Li, Mohamed G. Gouda
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
15 years 11 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
15 years 10 months ago
Lares: An Architecture for Secure Active Monitoring Using Virtualization
Host-based security tools such as anti-virus and intrusion detection systems are not adequately protected on today’s computers. Malware is often designed to immediately disable ...
Bryan D. Payne, Martim Carbone, Monirul I. Sharif,...