Sciweavers

278 search results - page 46 / 56
» Variants of Spreading Messages
Sort
View
ICARIS
2007
Springer
14 years 1 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
IMA
2007
Springer
117views Cryptology» more  IMA 2007»
14 years 1 months ago
On the Connection Between Signcryption and One-Pass Key Establishment
Key establishment between two parties that uses only one message transmission is referred to as one-pass key establishment (OPKE). OPKE provides the opportunity for very efficient ...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
ACSAC
2006
IEEE
14 years 1 months ago
Enhancing Collaborative Spam Detection with Bloom Filters
Signature-based collaborative spam detection (SCSD) systems provide a promising solution addressing many problems facing statistical spam filters, the most widely adopted technol...
Jeff Yan, Pook Leong Cho
NOMS
2006
IEEE
156views Communications» more  NOMS 2006»
14 years 1 months ago
An Integrated Solution to Protect Link State Routing against Faulty Intermediate Routers
— The importance of the routers in the network and the vulnerability in the nature of the link state routing protocol highlight the necessity of effective routing protection agai...
He Huang, Shyhtsun Felix Wu
FM
2003
Springer
146views Formal Methods» more  FM 2003»
14 years 23 days ago
Interacting State Machines for Mobility
We present two instantiations of generic Interactive State Machines (ISMs) with mobility features which are useful for modeling and verifying dynamically changing mobile systems. I...
Thomas A. Kuhn, David von Oheimb