Sciweavers

762 search results - page 96 / 153
» Security Contexts in Autonomic Systems
Sort
View
EUROSEC
2010
ACM
14 years 3 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
TSE
2010
120views more  TSE 2010»
13 years 8 months ago
Time and Probability-Based Information Flow Analysis
Abstract—In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial stud...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
IQIS
2004
ACM
14 years 3 months ago
A Framework for Analysis of Data Freshness
Data freshness has been identified as one of the most important data quality attributes in information systems. This importance increases particularly in the context of distribute...
Mokrane Bouzeghoub, Verónika Peralta
AI
1999
Springer
13 years 9 months ago
Cooperation without Deliberation: A Minimal Behavior-based Approach to Multi-Robot Teams
While terminology and some concepts of behavior-based robotics have become widespread, the central ideas are often lost as researchers try to scale behavior to higher levels of co...
Barry Brian Werger
DIM
2007
ACM
14 years 2 months ago
Linkability estimation between subjects and message contents using formal concepts
In this paper, we examine how conclusions about linkability threats can be drawn by analyzing message contents and subject knowledge in arbitrary communication systems. At first, ...
Stefan Berthold, Sebastian Clauß