Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Grid Computing is one of the new and innovative information technologies that attempt to make resources sharing global and more easier. Integrated in networked areas, the resources and services in grid are dynamic, heterogeneous and they belong to multiple spaced domains, which effectively enables a large scale collection, sharing and diffusion of data. However, grid computing stills a new paradigm...
Host-based anomaly intrusion detection system design is very challenging due to the notoriously high false alarm rate. This paper introduces a new host-based anomaly intrusion detection methodology using discontiguous system call patterns, in an attempt to increase detection rates whilst reducing false alarm rates. The key concept is to apply a semantic structure to kernel level system calls in order...
A number of shocking cyber-attacks have happened in recent years, and the damage they have caused has led to the emergence of cyber-security as a consideration when designing embedded systems. Software vulnerability and physical attack are the most severe threats the system face. This paper provides information about hardware designed to monitor potential intrusions and incidences of unauthorized...
One of the motivations for virtualization technology is the desire to develop new services to enhance system security without trusting both the applications and the operating systems. An intrusion detection system is an example of such service that can help to isolate users from malicious attacks. In this paper, we propose hybrid-based intrusion detection architecture in virtual computing environment...
Secure monitoring services supported by flexible, manageable, and cheap systems in areas where ordinary networks are unsuitable: this is one of to-day challenges in health monitoring engineering. Wireless sensor networks represent a promising technological solution but resource constraints and exposure to external attacks could limit their employment. The design and the implementation of an effective...
Wireless sensor networks (WSNs) are quickly gaining popularity due to the fact that they are potentially low-cost solutions that can be used in a variety of application areas. However, they are highly susceptible to attacks and it is very probable that an intruder catches already existing security measures out. AWISSENET (ad-hoc personal area network & wireless sensor secure network) is a project...
Wireless sensor networks will play an important role in the next generation pervasive computing. But the character of wireless communication brings a great challenge to the security management measures used in the communication protocols. These measures are different from conventional network security management methods. This paper proposed a security management model for self-organizing wireless...
Notice of Violation of IEEE Publication Principles"An Intrusion Detection Architecture for Ad hoc Network Based on Artificial Immune System"by Hongxia Xie and Zhengyun Huiin the Proceedings of the 7th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), Taipei, Taiwan, Dec. 2006After careful and considered review of the content and authorship...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.