Sciweavers

5511 search results - page 971 / 1103
» Security for Network Places
Sort
View
ICCS
2007
Springer
14 years 1 months ago
Combining Classifiers for Web Violent Content Detection and Filtering
Keeping people away from litigious information becomes one of the most important research area in network information security. Indeed, Web filtering is used to prevent access to u...
Radhouane Guermazi, Mohamed Hammami, Abdelmajid Be...
EUROMICRO
2004
IEEE
14 years 1 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
CCGRID
2001
IEEE
14 years 29 days ago
While You're Away: A System for Load-Balancing and Resource Sharing Based on Mobile Agents
While You're Away (WYA) is a distributed system that aggregates the computational power of individual computer systems. WYA introduces the notion of Roaming Computations - Ja...
Niranjan Suri, Paul T. Groth, Jeffrey M. Bradshaw
CIIT
2007
133views Communications» more  CIIT 2007»
13 years 10 months ago
Linear-tree rule structure for firewall optimization
Given a list of filtering rules with individual hitting probabilities, it is known that the average processing time of a linear-search based firewall can be minimized by searchi...
Liang Zhao, A. Shimae, Hiroshi Nagamochi
IWEC
2008
13 years 10 months ago
Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment
The ability to simulate a seaport environment, including illicit cargo and the sensors designed to detect such cargo, allows the evaluation of alternative detection methods in orde...
Allen Christiansen, Damian Johnson, Lawrence B. Ho...