Sciweavers

617 search results - page 86 / 124
» Research Challenges for the Security of Control Systems
Sort
View
CCS
2010
ACM
13 years 9 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ATAL
2008
Springer
13 years 11 months ago
Coordination of first responders under communication and resource constraints
This paper discusses the application of distributed constraint optimization to coordination in disaster management situations under sub-optimal network conditions. It presents an ...
Robert N. Lass, Joseph B. Kopena, Evan Sultanik, D...
COMPUTER
2004
100views more  COMPUTER 2004»
13 years 9 months ago
Rainbow: Architecture-Based Self-Adaptation with Reusable Infrastructure
any benefits. Most significantly, an abstract architectural model can provide a global perspective of the system and expose important system-level properties and integrity constrai...
David Garlan, Shang-Wen Cheng, An-Cheng Huang, Bra...
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
14 years 4 months ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
HASE
2007
IEEE
14 years 3 months ago
A Mobile Agent-based Multi-Robot Design Method for High-Assurance
During the past several years, the area of robot service and multi-robot has grown rapidly. Since this area is a fusion industry consisting of multiple disciplines, it is lack of ...
Sung-Ook Shin, Jung-Oog Lee, Doo-Kwon Baik