• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,011
Next 10 →

Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security

by David P. Gilliam, John D. Powell - Risk,” Proceedings on the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises , 2002
"... The network security assessment instrument is a comprehensive set of tools that can be used individually or collectively to ensure the security of network aware software applications and systems. Using the various tools collectively provide a distinct advantage for assuring the security of software ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
The network security assessment instrument is a comprehensive set of tools that can be used individually or collectively to ensure the security of network aware software applications and systems. Using the various tools collectively provide a distinct advantage for assuring the security of software

Mobile Agents: Are They a Good Idea?

by David Chess, Colin Harrison, Aaron Kershenbaum, T. J. Watson , 1995
"... Mobile agents are programs, typically written in a script language, which may be dispatched from a client computer and transported to a remote server computer for execution. Several authors have suggested that mobile agents offer an important new method of performing transactions and information ret ..."
Abstract - Cited by 398 (2 self) - Add to MetaCart
retrieval in networks. Other writers have pointed out, however, that mobile agent introduce severe concerns for security. We consider the advantages offered by mobile agents and assess them against alternate methods of achieving the same function. We conclude that, while the individual advantages of agents

The Security of Vehicular Ad Hoc Networks

by Maxim Raya, Jean-Pierre Hubaux - SASN , 2005
"... Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, wh ..."
Abstract - Cited by 298 (12 self) - Add to MetaCart
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made

Vigilante: End-to-End Containment of Internet Worm Epidemics

by Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham , 2008
"... Worm containment must be automatic because worms can spread too fast for humans to respond. Recent work proposed network-level techniques to automate worm containment; these techniques have limitations because there is no information about the vulnerabilities exploited by worms at the network level. ..."
Abstract - Cited by 304 (6 self) - Add to MetaCart
of security alert that can be inexpensively verified by any vulnerable host. Using SCAs, hosts can cooperate to contain an outbreak, without having to trust each other. Vigilante broadcasts SCAs over an overlay network that propagates alerts rapidly and resiliently. Hosts receiving an SCA protect themselves

A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography

by David J. Malan, Matt Welsh, Michael D. Smith
"... We present the first known implementation of elliptic curve cryptography over F2p for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of UC Berkeley’s TinySec module, we argue that, although secret-key cryptography has been tractable in this domain for some time, ..."
Abstract - Cited by 269 (4 self) - Add to MetaCart
We present the first known implementation of elliptic curve cryptography over F2p for sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of UC Berkeley’s TinySec module, we argue that, although secret-key cryptography has been tractable in this domain for some time

Learning from imbalanced data

by Haibo He, Edwardo A. Garcia - IEEE Trans. on Knowledge and Data Engineering , 2009
"... Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision-m ..."
Abstract - Cited by 260 (6 self) - Add to MetaCart
Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision

CodeBlue: An ad hoc sensor network infrastructure for emergency medical care

by David Malan, Thaddeus Fulford-jones, Matt Welsh, Steve Moulton - In International Workshop on Wearable and Implantable Body Sensor Networks , 2004
"... Sensor devices integrating embedded processors, low-power, lowbandwidth radios, and a modest amount of storage have the potential to enhance emergency medical care. Wearable vital sign sensors can track patient status and location, while simultaneously operating as active tags. We introduce CodeBlue ..."
Abstract - Cited by 222 (6 self) - Add to MetaCart
efficient allocation of hospital resources. Intended to scale to very dense networks with thousands of devices and extremely volatile network conditions, this infrastructure will support reliable, ad hoc data delivery, a flexible naming and discovery scheme, and a decentralized security model. This paper

Children’s perceptions of the personal relationships in their social networks

by Wyndol Furman, Duane Buhrmester - Developmental Psychology , 1985
"... Relatively few investigators have compared and contrasted the characteristics of different kinds of relationships in children's social networks. In the present study, 199 fifth- and sixth-grade children completed Network of Relationships Inventories, which assessed 10 qualities of their relatio ..."
Abstract - Cited by 188 (2 self) - Add to MetaCart
Relatively few investigators have compared and contrasted the characteristics of different kinds of relationships in children's social networks. In the present study, 199 fifth- and sixth-grade children completed Network of Relationships Inventories, which assessed 10 qualities

Finding Security Vulnerabilities in Java Applications with Static Analysis

by V. Benjamin Livshits , Monica S. Lam , 2005
"... This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting attacks. These vulnerabilities stem from unchecked input, which is widely recognized as the most common source of securi ..."
Abstract - Cited by 169 (3 self) - Add to MetaCart
specification in the statically analyzed code. Results of our static analysis are presented to the user for assessment in an auditing interface integrated within Eclipse, a popular Java development environment. Our static analysis found 29 security vulnerabilities in nine large, popular open-source applications

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
-calculated decision of a barge captain on how to get the most out of his money and time. The performance in these tasks is managed by the brain, which assesses the values and uncertainties of predictable outcomes (sausage, ale, wine, lock pricing, and access to resources) and directs the individuals' decisions
Next 10 →
Results 1 - 10 of 2,011
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University