Sciweavers

1081 search results - page 77 / 217
» Towards Application Security on Untrusted Operating Systems
Sort
View
CCS
2003
ACM
14 years 2 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
ACSAC
2005
IEEE
14 years 2 months ago
A User-level Framework for Auditing and Monitoring
Logging and auditing is an important system facility for monitoring correct system operation and for detecting potential security problems. We present an architecture for implemen...
Yongzheng Wu, Roland H. C. Yap
BIB
2007
99views more  BIB 2007»
13 years 9 months ago
Towards a calculus of biomolecular complexes at equilibrium
An overview is presented of the construction and use of algebraic partition functions to represent the equilibrium statistical mechanics of multimolecular complexes and their acti...
Eric Mjolsness
ICCS
2001
Springer
14 years 1 months ago
Towards an Accurate Model for Collective Communications
The performance of the MPI’s collective communications is critical in most MPI-based applications. A general algorithm for a given collective communication operation may not give...
Sathish S. Vadhiyar, Graham E. Fagg, Jack Dongarra
CORR
2008
Springer
187views Education» more  CORR 2008»
13 years 9 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...