Sciweavers

847 search results - page 125 / 170
» Monitoring the connectivity of a grid
Sort
View
AINA
2009
IEEE
14 years 1 months ago
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion
-- Most network intruders launch their attacks through stepping-stones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical...
Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long ...
DSN
2006
IEEE
14 years 15 days ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
VLDB
2000
ACM
119views Database» more  VLDB 2000»
14 years 12 days ago
Process Automation as the Foundation for E-Business
E-business is becoming the trademark of the 2000s. Companies are using the Web to communicate with their partners, connect with their back-end systems, and perform e-commerce tran...
Fabio Casati, Ming-Chien Shan
ICINCO
2004
122views Robotics» more  ICINCO 2004»
13 years 10 months ago
Data Security Considerations in Modern Automation Networks
: The automation manufacturing business has reached its turning point and manufacturers are forced to create new business areas. Their expertise about field devices will be the sou...
Mikko Salmenperä, Jari Seppälä
IJSNET
2008
138views more  IJSNET 2008»
13 years 8 months ago
Energy-efficient connected-coverage in wireless sensor networks
Abstract: This paper addresses the target coverage problem in wireless sensor networks. Communication and sensing consume energy, therefore efficient power management can extend ne...
Ionut Cardei, Mihaela Cardei