Sciweavers

77 search results - page 16 / 16
» Protecting Mobile Agents Against Malicious Hosts
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 2 days ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
ICS
2003
Tsinghua U.
13 years 12 months ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...