Sciweavers

1587 search results - page 93 / 318
» Security Patterns and Secure Systems Design Using UML
Sort
View
COMCOM
2000
95views more  COMCOM 2000»
15 years 4 months ago
Countermeasures for mobile agent security
: Security is an important issue for the widespread deployment of applications based on software agent technology. It is generally agreed that without the proper countermeasures in...
Wayne A. Jansen
ICANN
2005
Springer
15 years 10 months ago
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behav...
Emilio Corchado, Álvaro Herrero, José...
EUPROJECTS
2006
Springer
15 years 8 months ago
Applying the MVC Pattern to Generated User Interfaces with a Focus on Audio
The mobile user can interact with devices in the environment using either the devices themselves or a device she carries with her. This requires an adaption of the user interface t...
Dirk Schnelle, Tobias Klug
NOMS
2006
IEEE
105views Communications» more  NOMS 2006»
15 years 10 months ago
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
— Flow-level traffic measurement is required for a wide range of applications including accounting, network planning and security management. A key design challenge is how to gr...
Yan Hu, Dah-Ming Chiu, John C. S. Lui
LISA
2004
15 years 5 months ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...