Sciweavers

501 search results - page 59 / 101
» Redundancy and Diversity in Security
Sort
View
ISI
2007
Springer
14 years 2 months ago
Design and Implementation of a Middleware for Sentient Spaces
— Surveillance is an important task for guaranteeing the security of individuals. Being able to intelligently monitor the activity in given spaces is essential to achieve such su...
Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyu...
CISC
2005
Springer
116views Cryptology» more  CISC 2005»
14 years 1 months ago
Specifying Authentication Using Signal Events in CSP
The formal analysis of cryptographic protocols has developed into a comprehensive body of knowledge, building on a wide variety of formalisms and treating a diverse range of securi...
Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
FC
2005
Springer
110views Cryptology» more  FC 2005»
14 years 1 months ago
A Privacy-Protecting Coupon System
A coupon represents the right to claim some service which is typically offered by vendors. In practice, issuing bundled multi-coupons is more efficient than issuing single coupons...
Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, ...
CCS
2004
ACM
14 years 1 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
JCS
2011
138views more  JCS 2011»
12 years 10 months ago
Automatic analysis of malware behavior using machine learning
Malicious software—so called malware—poses a major threat to the security of computer systems. The amount and diversity of its variants render classic security defenses ineffe...
Konrad Rieck, Philipp Trinius, Carsten Willems, Th...