Sciweavers

7741 search results - page 59 / 1549
» Security in Active Networks
Sort
View
IWAN
1999
Springer
15 years 7 months ago
Active Information Networks and XML
Future requirements for a broadband multimedia network are discussed and a vision of the future network is
Ian Marshall, Michael Fry, Luis Velasco, Atanu Gho...
145
Voted
AGENTS
1997
Springer
15 years 7 months ago
Creatures: Artificial Life Autonomous Software Agents for Home Entertainment
This paper gives a technical description of Creatures, a commercial home-entertainment software package. Creatures provides a simulated environment in which exist a number of synt...
Stephen Grand, Dave Cliff, Anil Malhotra
132
Voted
ICAI
2008
15 years 4 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
132
Voted
NSPW
2003
ACM
15 years 8 months ago
Locality: a new paradigm for thinking about normal behavior and outsider threat
Locality as a unifying concept for understanding the normal behavior of benign users of computer systems is suggested as a unifying paradigm that will support the detection of mal...
John McHugh, Carrie Gates
129
Voted
AINA
2006
IEEE
15 years 9 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...