Sciweavers

3003 search results - page 136 / 601
» Software Security: Building Security In
Sort
View
APNOMS
2006
Springer
14 years 1 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...
ATC
2006
Springer
14 years 1 months ago
Development and Runtime Support for Situation-Aware Security in Autonomic Computing
Abstract. To overcome increasing complexity and dynamic nature of distributed computing system, such as ubiquitous computing systems, it is critical to have computing systems that ...
Stephen S. Yau, Yisheng Yao, Min Yan
ISICT
2003
13 years 11 months ago
Security in the Web Services Framework
The Web Services Framework provides techniques to enable the application-toapplication use of the Web. It has the potential of becoming the core of a new Web-based middleware plat...
Chen Li 0008, Claus Pahl
TON
2008
102views more  TON 2008»
13 years 10 months ago
Internet traffic behavior profiling for network security monitoring
Abstract--Recent spates of cyber-attacks and frequent emergence of applications affecting Internet traffic dynamics have made it imperative to develop effective techniques that can...
Kuai Xu, Zhi-Li Zhang, Supratik Bhattacharyya
CN
2010
83views more  CN 2010»
13 years 9 months ago
Secure peer sampling
PuppetCast is a protocol for secure peer sampling in large-scale distributed systems. A peer sampling protocol continuously provides each node in the system with a uniform random ...
Gian Paolo Jesi, Alberto Montresor, Maarten van St...