Sciweavers

5511 search results - page 974 / 1103
» Security for Network Places
Sort
View
117
Voted
IJAMC
2008
84views more  IJAMC 2008»
15 years 3 months ago
Towards an authentication service for Peer-to-Peer based Massively Multiuser Virtual Environments
Abstract-- In this paper we propose a distributed authentication service for peer-to-peer (P2P) based massively multiuser virtual environments. Such a service is necessary to provi...
Arno Wacker, Gregor Schiele, Sebastian Schuster, T...
105
Voted
AC
2004
Springer
15 years 3 months ago
Cognitive Hacking
In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a comp...
George Cybenko, Annarita Giani, Paul Thompson
145
Voted
COMCOM
2002
189views more  COMCOM 2002»
15 years 3 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
135
Voted
EC
2000
136views ECommerce» more  EC 2000»
15 years 3 months ago
Architecture for an Artificial Immune System
An artificial immune system (ARTIS) is described which incorporates many properties of natural immune systems, including diversity, distributed computation, error tolerance, dynam...
Steven A. Hofmeyr, Stephanie Forrest
122
Voted
CNSM
2010
15 years 1 months ago
A performance view on DNSSEC migration
In July 2008, the Kaminsky attack showed that DNS is sensitive to cache poisoning, and DNSSEC is considered the long term solution to mitigate this attack. A lot of technical docum...
Daniel Migault, Cedric Girard, Maryline Laurent