Sciweavers

441 search results - page 32 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
IPPS
2009
IEEE
14 years 5 months ago
Performance analysis of distributed intrusion detection protocols for mobile group communication systems
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while boundin...
Jin-Hee Cho, Ing-Ray Chen
RAID
1999
Springer
14 years 3 months ago
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Peter Mell, Mark McLarnon
ICARIS
2007
Springer
14 years 5 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
DAC
2009
ACM
13 years 8 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
DISCEX
2003
IEEE
14 years 4 months ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim