Sciweavers

64 search results - page 7 / 13
» Secure Failure Detection in TrustedPals
Sort
View
102
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Backtracking Algorithmic Complexity Attacks against a NIDS
Network Intrusion Detection Systems (NIDS) have become crucial to securing modern networks. To be effective, a NIDS must be able to counter evasion attempts and operate at or near...
Randy Smith, Cristian Estan, Somesh Jha
130
Voted
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 9 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
152
Voted
WICOMM
2008
258views more  WICOMM 2008»
15 years 2 months ago
Introducing reliability and load balancing in mobile IPv6-based networks
With the recent advances in portable devices and wireless networks, a new paradigm of computing has emerged which is known as mobile computing. In general mobile computing can be ...
Jahanzeb Faizan, Hesham El-Rewini, Mohamed Khalil
CORR
2010
Springer
99views Education» more  CORR 2010»
15 years 3 months ago
Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits
Abstract--We investigate the problem of maintaining an encoded distributed storage system when some nodes contain adversarial errors. Using the error-correction capabilities that a...
Theodoros K. Dikaliotis, Alexandros G. Dimakis, Tr...
117
Voted
IWSEC
2009
Springer
15 years 10 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...