Sciweavers

2178 search results - page 172 / 436
» Toward Systemically Secure IT Architectures
Sort
View
IEEECIT
2010
IEEE
13 years 7 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
PERCOM
2006
ACM
14 years 9 months ago
Dynamic Peer-To-Peer Overlays for Voice Systems
Different devices, such as mobile phones, soft phones, or desktop phones, have varying processing power, bandwidth, and media capabilities. Heterogeneous P2P voice systems that ar...
Krishna Kishore Dhara, Salman Baset
DANCE
2002
IEEE
14 years 2 months ago
Active Network Vision and Reality: Lessons from a Capsule-Based System
Although active networks have generated much debate in the research community, on the whole there has been little hard evidence to inform this debate. This paper aims to redress t...
David Wetherall
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 3 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
SOFSEM
2009
Springer
14 years 1 months ago
Can Component/Service-Based Systems Be Proved Correct?
Component-oriented and service-oriented approaches have gained a strong enthusiasm in industries and academia with a particular interest for service-oriented approaches. The servic...
Christian Attiogbé