Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In Wi-Fi networks, Device-to-Device (D2D) communications aim to improve the efficiency of the network by supporting direct communication between users in close proximity. However, in a congested Wi-Fi network, establishing D2D connections through a locally managed self-organising approach will intensify the congestion and reduce the scalability of the solution. Therefore, a centralised management...
Securing applications and services provided in the Cloud against cyber attacks is hard to achieve, due to the complexity, heterogeneity, and dynamic nature of such systems. Federated Cloud environments, and Cloud Service Providers will benefit significantly if there is a comprehensive intrusion detection methodology that evolves based on their requirements, i.e. nonintrusive and resilient. The cooperation...
Collaborative behavioural monitoring (CBM) is becoming an increasingly popular solution used in complex and large-scale systems such as a system-of-systems (SoS). It has the ability to overcome the challenges associated with monitoring behaviour in the distributed, decentralised and dynamic environment of a SoS. However, the effectiveness of this approach depends upon the similarity of structural...
The unique characteristics of a system-of-systems (SoS) environment pose many significant technical challenges when it comes to monitoring the behaviour of its component systems. In this collaborative environment, component misbehaviour is one of the most significant security threats. A key countermeasure is the ability to detect behaviour that could jeopardise the integrity, availability or functionality...
The Future Internet will be populated by not just data and devices, but also services. Service-Oriented Architecture (SOA) approaches are allowing new ways for users and developers to manage, control and benefit from the services that are being made available. However, SOA-based applications are highly dynamic and liable to change significantly at runtime. This justifies the need for monitoring composed...
Live digital forensic techniques that capture a snapshot of operational state at the time of seizure are helpful, but only provide information about the current state. Attempting to audit every interaction on a system will yield records that are difficult to even store, with a low ratio of useful information to noise. In this paper we propose a distributed trace based monitoring platform that applies...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.