Sciweavers

591 search results - page 66 / 119
» Securing the Broker Pattern
Sort
View
ISI
2007
Springer
14 years 2 months ago
A Combinatorial Approach to Measuring Anonymity
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
Matthew Edman, Fikret Sivrikaya, Bülent Yener
VTC
2006
IEEE
179views Communications» more  VTC 2006»
14 years 2 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu
IEEEARES
2010
IEEE
14 years 2 months ago
Heuristics for Detecting Botnet Coordinated Attacks
— This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting beh...
Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, M...
AGENTS
1999
Springer
14 years 1 months ago
Adaptive Web Site Agents
We discuss the design of a class of agents that we call adaptive web site agents. The goal of such an agent is to help a user find information at a particular web site, adapting i...
Michael J. Pazzani, Daniel Billsus
OOPSLA
1998
Springer
14 years 27 days ago
Role Model Based Framework Design and Integration
Today, any large object-oriented software system is built using frameworks. Yet, designing frameworks and defining their interaction with clients remains a difficult task. A prima...
Dirk Riehle, Thomas R. Gross