Results 1 - 10
of
2,011
Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security
- Risk,” Proceedings on the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, 2002
"... The network security assessment instrument is a comprehensive set of tools that can be used individually or collectively to ensure the security of network aware software applications and systems. Using the various tools collectively provide a distinct advantage for assuring the security of software ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
The network security assessment instrument is a comprehensive set of tools that can be used individually or collectively to ensure the security of network aware software applications and systems. Using the various tools collectively provide a distinct advantage for assuring the security of software
Mobile Agents: Are They a Good Idea?
, 1995
"... Mobile agents are programs, typically written in a script language, which may be dispatched from a client computer and transported to a remote server computer for execution. Several authors have suggested that mobile agents offer an important new method of performing transactions and information ret ..."
Abstract
-
Cited by 398 (2 self)
- Add to MetaCart
retrieval in networks. Other writers have pointed out, however, that mobile agent introduce severe concerns for security. We consider the advantages offered by mobile agents and assess them against alternate methods of achieving the same function. We conclude that, while the individual advantages of agents
The Security of Vehicular Ad Hoc Networks
- SASN
, 2005
"... Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, wh ..."
Abstract
-
Cited by 298 (12 self)
- Add to MetaCart
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made
Vigilante: End-to-End Containment of Internet Worm Epidemics
, 2008
"... Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the vulnerabilities exploited by worms at the network level. ..."
Abstract
-
Cited by 304 (6 self)
- Add to MetaCart
of security alert that can be inexpensively verified by any vulnerable host. Using SCAs, hosts can cooperate to contain an outbreak, without having to trust each other. Vigilante broadcasts SCAs over an overlay network that propagates alerts rapidly and resiliently. Hosts receiving an SCA protect themselves
A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography
"... We present the first known implementation of elliptic curve cryptography over F2p for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of UC Berkeley’s TinySec module, we argue that, although secret-key cryptography has been tractable in this domain for some time, ..."
Abstract
-
Cited by 269 (4 self)
- Add to MetaCart
We present the first known implementation of elliptic curve cryptography over F2p for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of UC Berkeley’s TinySec module, we argue that, although secret-key cryptography has been tractable in this domain for some time
Learning from imbalanced data
- IEEE Trans. on Knowledge and Data Engineering
, 2009
"... Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision-m ..."
Abstract
-
Cited by 260 (6 self)
- Add to MetaCart
Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision
CodeBlue: An ad hoc sensor network infrastructure for emergency medical care
- In International Workshop on Wearable and Implantable Body Sensor Networks
, 2004
"... Sensor devices integrating embedded processors, low-power, lowbandwidth radios, and a modest amount of storage have the potential to enhance emergency medical care. Wearable vital sign sensors can track patient status and location, while simultaneously operating as active tags. We introduce CodeBlue ..."
Abstract
-
Cited by 222 (6 self)
- Add to MetaCart
efficient allocation of hospital resources. Intended to scale to very dense networks with thousands of devices and extremely volatile network conditions, this infrastructure will support reliable, ad hoc data delivery, a flexible naming and discovery scheme, and a decentralized security model. This paper
Children’s perceptions of the personal relationships in their social networks
- Developmental Psychology
, 1985
"... Relatively few investigators have compared and contrasted the characteristics of different kinds of relationships in children's social networks. In the present study, 199 fifth- and sixth-grade children completed Network of Relationships Inventories, which assessed 10 qualities of their relatio ..."
Abstract
-
Cited by 188 (2 self)
- Add to MetaCart
Relatively few investigators have compared and contrasted the characteristics of different kinds of relationships in children's social networks. In the present study, 199 fifth- and sixth-grade children completed Network of Relationships Inventories, which assessed 10 qualities
Finding Security Vulnerabilities in Java Applications with Static Analysis
, 2005
"... This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting attacks. These vulnerabilities stem from unchecked input, which is widely recognized as the most common source of securi ..."
Abstract
-
Cited by 169 (3 self)
- Add to MetaCart
specification in the statically analyzed code. Results of our static analysis are presented to the user for assessment in an auditing interface integrated within Eclipse, a popular Java development environment. Our static analysis found 29 security vulnerabilities in nine large, popular open-source applications
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
-calculated decision of a barge captain on how to get the most out of his money and time. The performance in these tasks is managed by the brain, which assesses the values and uncertainties of predictable outcomes (sausage, ale, wine, lock pricing, and access to resources) and directs the individuals' decisions
Results 1 - 10
of
2,011