Sciweavers

11603 search results - page 2188 / 2321
» Securing Embedded Systems
Sort
View
140
Voted
CBMS
2006
IEEE
15 years 8 months ago
Dorian: Grid Service Infrastructure for Identity Management and Federation
Identity management and federation is becoming an ever present problem in large multi-institutional environments. By their nature, Grids span multiple institutional administration...
Stephen Langella, Scott Oster, Shannon Hastings, F...
130
Voted
CCGRID
2006
IEEE
15 years 8 months ago
An Extensible Resource Discovery Mechanism for Grid Computing Environments
Grid computing is emerging as a new infrastructure to provide collaborative and secure resource sharing over multiple geographically distributed organizations. In this scenario, r...
Tania Gomes Ramos, Alba Cristina Magalhaes Alves d...
129
Voted
DSD
2006
IEEE
113views Hardware» more  DSD 2006»
15 years 8 months ago
Lifetime Analysis in Heterogeneous Sensor Networks
Wireless sensor networks (WSN) are composed of battery-driven communication entities performing multiple, usually different tasks. In order to complete a given task, all sensor no...
Falko Dressler, Isabel Dietrich
111
Voted
DSN
2006
IEEE
15 years 8 months ago
VoIP Intrusion Detection Through Interacting Protocol State Machines
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing ...
Hemant Sengar, Duminda Wijesekera, Haining Wang, S...
123
Voted
DSN
2006
IEEE
15 years 8 months ago
Honeypot-Aware Advanced Botnet Construction and Maintenance
Because “botnets” can be used for illicit financial gain, they have become quite popular in recent Internet attacks. “Honeypots” have been successfully deployed in many d...
Cliff Changchun Zou, Ryan Cunningham
« Prev « First page 2188 / 2321 Last » Next »