Sciweavers

1219 search results - page 8 / 244
» Where to Look Next
Sort
View
FTDCS
2003
IEEE
14 years 25 days ago
Looking for a Common View for Mobile Worlds
This paper considers central issues of distributed computing in a mobile environment. Its aim is to light on the first brick of a common view for mobile systems. We pool together...
Maria Gradinariu, Michel Raynal, Gwendal Simon
ACSAC
2004
IEEE
13 years 11 months ago
A Look Back at "Security Problems in the TCP/IP Protocol Suite"
About fifteen years ago, I wrote a paper on security problems in the TCP/IP protocol suite, In particular, I focused on protocol-level issues, rather than implementation flaws. It...
Steven M. Bellovin
APCHI
2004
IEEE
13 years 11 months ago
Commercial Success by Looking for Desire Lines
`Desire Lines' are the ultimate unbiased expression of natural human purpose and refer to tracks worn across grassy spaces, where people naturally walk
Carl Myhill
CN
2007
91views more  CN 2007»
13 years 7 months ago
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next lik...
Dong Yu, Deborah A. Frincke
SPW
2000
Springer
13 years 11 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano