Sciweavers

1597 search results - page 188 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
14 years 3 months ago
Toward a Query Language for Network Attack Data
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
MDM
2009
Springer
201views Communications» more  MDM 2009»
14 years 3 months ago
OntoMobiLe: A Generic Ontology-Centric Service-Oriented Architecture for Mobile Learning
Creation of pedagogical learning models to handle the specificity of mobile learning and the inherent constraints of mobile devices is a fundamental challenge in mobile learning. ...
Keng Y. Yee, Wee Tiong Ang, Flora S. Tsai, Rajaram...
OTM
2009
Springer
14 years 3 months ago
An Architecture for Dynamic Trust Monitoring in Mobile Networks
Collusion attacks remain a major problem of reputation and trust models, in mobile ad hoc networks. By covering up malicious behaviour of one another from the remaining part of the...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
ICICS
2005
Springer
14 years 2 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
ICITA
2005
IEEE
14 years 2 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon