Sciweavers

211 search results - page 15 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
IAT
2010
IEEE
13 years 4 months ago
Predictive Analytics Using a Blackboard-Based Reasoning Agent
Significant increase in collected data for investigative tasks and the increased complexity of the reasoning process itself have made investigative analytical tasks more challengi...
Jia Yue, Anita Raja, William Ribarsky
CRITIS
2006
13 years 11 months ago
Trust Establishment in Ad Hoc and Sensor Networks
Ad hoc and sensor networks highly depend on the distributed cooperation among network nodes. Trust establishment frameworks provide the means for representing, evaluating, maintain...
Efthimia Aivaloglou, Stefanos Gritzalis, Charalabo...
CEC
2010
IEEE
13 years 7 months ago
Designing airfoils using a reference point based evolutionary many-objective particle swarm optimization algorithm
— In this paper, we illustrate the use of a reference point based many-objective particle swarm optimization algorithm to optimize low-speed airfoil aerodynamic designs. Our fram...
Upali K. Wickramasinghe, Robert Carrese, Xiaodong ...
MOBIHOC
2005
ACM
14 years 7 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao
ACSAC
2008
IEEE
14 years 2 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu