Sciweavers

2442 search results - page 395 / 489
» Secure Service Orchestration
Sort
View
GECCO
2005
Springer
183views Optimization» more  GECCO 2005»
14 years 3 months ago
802.11 network intrusion detection using genetic programming
Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Patrick LaRoche, A. Nur Zincir-Heywood
ICCSA
2005
Springer
14 years 3 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
WAC
2005
Springer
122views Communications» more  WAC 2005»
14 years 3 months ago
Trust Management Issues for Ad Hoc and Self-organized Networks
Self-organized and ad hoc communications have many fundamental principles in common and also face similar problems in the domains of security and Quality of Service. Trust manageme...
Vassileios Tsetsos, Giannis F. Marias, Sarantis Pa...
SIGECOM
2004
ACM
115views ECommerce» more  SIGECOM 2004»
14 years 3 months ago
Limited reputation sharing in P2P systems
The increasing popularity of resource exchange through peerto-peer networks has encouraged the development of ways to support more complex commercial transactions over these netwo...
Sergio Marti, Hector Garcia-Molina
ATAL
2004
Springer
14 years 3 months ago
Coordinating Multiple Concurrent Negotiations
To secure good deals, an agent may engage in multiple concurrent negotiations for a particular good or service. However for this to be effective, the agent needs to carefully coor...
Thuc Duong Nguyen, Nicholas R. Jennings