Sciweavers

7629 search results - page 1294 / 1526
» On the Performance of a Survivability Architecture for Netwo...
Sort
View
CCS
2003
ACM
14 years 2 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
TMC
2010
130views more  TMC 2010»
13 years 7 months ago
SYNAPSE++: Code Dissemination in Wireless Sensor Networks Using Fountain Codes
—This paper presents SYNAPSE++, a system for over the air reprogramming of wireless sensor networks (WSNs). In contrast to previous solutions, which implement plain negative ackn...
Michele Rossi, Nicola Bui, Giovanni Zanca, Luca St...
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 4 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
AUSFORENSICS
2004
13 years 10 months ago
An Analysis and Comparison of Clustered Password Crackers
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
Christian Frichot
CCGRID
2010
IEEE
13 years 10 months ago
Energy Efficient Resource Management in Virtualized Cloud Data Centers
Rapid growth of the demand for computational power by scientific, business and web-applications has led to the creation of large-scale data centers consuming enormous amounts of el...
Anton Beloglazov, Rajkumar Buyya
« Prev « First page 1294 / 1526 Last » Next »