Sciweavers

2178 search results - page 74 / 436
» Toward Systemically Secure IT Architectures
Sort
View
DEXAW
1999
IEEE
75views Database» more  DEXAW 1999»
14 years 1 months ago
Coordination of Security Levels for Internet Architectures
Internet systems provide a variety of ways to exchange information, contain large amounts and variety of data, and have become quite complex, making them vulnerable to attacks fro...
Eduardo B. Fernández
SENSYS
2004
ACM
14 years 2 months ago
TinySec: a link layer security architecture for wireless sensor networks
We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vul...
Chris Karlof, Naveen Sastry, David Wagner
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
WSC
2000
13 years 10 months ago
A simulation test-bed to evaluate multi-agent control of manufacturing systems
Current research in the area of manufacturing planning and control has moved away from traditional centralized solutions towards distributed architectures that range from hierarch...
Robert W. Brennan, William O
CSMR
2004
IEEE
14 years 23 days ago
Architecture-Aware Adaptive Clustering of OO Systems
The recovery of software architecture is a first important step towards re-engineering a software system. Architecture recovery usually involves clustering. The problem with curre...
Markus Bauer, Mircea Trifu