Sciweavers

1098 search results - page 216 / 220
» Proactive Intrusion Detection
Sort
View
CF
2004
ACM
14 years 24 days ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
VLDB
2004
ACM
100views Database» more  VLDB 2004»
14 years 21 days ago
Resilient Rights Protection for Sensor Streams
Today’s world of increasingly dynamic computing environments naturally results in more and more data being available as fast streams. Applications such as stock market analysis,...
Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
WS
2003
ACM
14 years 18 days ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
GI
2003
Springer
14 years 17 days ago
Ohne Sicherheit kein Vertrauen in E-Business und eingebettete Systeme
Das Fachgebiet Sicherheit hat sich in den vergangenen Jahren aus verschiedenen Disziplinen der Informatik als Querschnittsthema der Angewandten, Praktischen, Theoretischen und Tech...
Isabel Münch, Manfred Reitenspieß
AINA
2010
IEEE
14 years 14 days ago
Minimizing Execution Costs when Using Globally Distributed Cloud Services
Cloud computing is an emerging technology that allows users to utilize on-demand computation, storage, data and services from around the world. However, Cloud service providers ch...
Suraj Pandey, Adam Barker, Kapil Kumar Gupta, Rajk...