Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
— The demand for even higher data rates in future mobile communications systems calls for new techniques capable of improving the performance of cellular systems. One possibility...
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Abstract--Service-Oriented Architectures address the development of distributed and dynamic service-based applications. Due to the dynamics of their environments, services should b...
Andre Lage Freitas, Jean-Louis Pazat, Nikos Parlav...