Conferences in DBLP
(atc) 2008 (conf/atc/2008)
Sensor Network Applications Implemented by Industry and Their Security Challenges. [Citation Graph (, )][DBLP ] Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. [Citation Graph (, )][DBLP ] Preventing DDoS Attacks Based on Credit Model for P2P Streaming System. [Citation Graph (, )][DBLP ] Design, Prototype, and Evaluation of a Network Monitoring Library. [Citation Graph (, )][DBLP ] Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN. [Citation Graph (, )][DBLP ] A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments. [Citation Graph (, )][DBLP ] Using Automated Planning for Trusted Self-organising Organic Computing Systems. [Citation Graph (, )][DBLP ] A Trusted Group Signature Architecture in Virtual Computing Environment. [Citation Graph (, )][DBLP ] SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks. [Citation Graph (, )][DBLP ] Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. [Citation Graph (, )][DBLP ] An Integrated Solution for Policy Filtering and Traffic Anomaly Detection. [Citation Graph (, )][DBLP ] Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations. [Citation Graph (, )][DBLP ] SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. [Citation Graph (, )][DBLP ] Scheduling for Reliable Execution in Autonomic Systems. [Citation Graph (, )][DBLP ] Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation. [Citation Graph (, )][DBLP ] Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots. [Citation Graph (, )][DBLP ] Maximising Personal Utility Using Intelligent Strategy in Minority Game. [Citation Graph (, )][DBLP ] Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation. [Citation Graph (, )][DBLP ] Organic Control of Traffic Lights. [Citation Graph (, )][DBLP ] Concepts for Autonomous Control Flow Checking for Embedded CPUs. [Citation Graph (, )][DBLP ] Autonomous Querying for Knowledge Networks. [Citation Graph (, )][DBLP ] Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database. [Citation Graph (, )][DBLP ] Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network. [Citation Graph (, )][DBLP ] Self-reconfiguration in Highly Available Pervasive Computing Systems. [Citation Graph (, )][DBLP ] Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose. [Citation Graph (, )][DBLP ] An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL. [Citation Graph (, )][DBLP ] Distributed Performance Control in Organic Embedded Systems. [Citation Graph (, )][DBLP ] An Operating System Architecture for Organic Computing in Embedded Real-Time Systems. [Citation Graph (, )][DBLP ] Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Embedding Dynamic Behaviour into a Self-configuring Software System. [Citation Graph (, )][DBLP ] Service Discovery of IP Cameras Using SIP and Zeroconf Protocols. [Citation Graph (, )][DBLP ] Adaptability of the TRSIM Model to Some Changes in Agents Behaviour. [Citation Graph (, )][DBLP ] Trusting Groups in Coalition Formation Using Social Distance. [Citation Graph (, )][DBLP ] Adjustable Trust Model for Access Control. [Citation Graph (, )][DBLP ] Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering. [Citation Graph (, )][DBLP ] A User Behavior Based Trust Model for Mobile Applications. [Citation Graph (, )][DBLP ] Managing Contracts in Pleiades Using Trust Management. [Citation Graph (, )][DBLP ] A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily. [Citation Graph (, )][DBLP ] Annotation Markers for Runtime Replication Protocol Selection. [Citation Graph (, )][DBLP ] Enhanced Three-Round Smart Card-Based Key Exchange Protocol. [Citation Graph (, )][DBLP ] Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments. [Citation Graph (, )][DBLP ] A Study of Information Security Practice in a Critical Infrastructure Application. [Citation Graph (, )][DBLP ] Web Search Results Clustering Based on a Novel Suffix Tree Structure. [Citation Graph (, )][DBLP ] Di-GAFR: Directed Greedy Adaptive Face-Based Routing. [Citation Graph (, )][DBLP ] Cooperative Management Framework for Inter-domain Routing System. [Citation Graph (, )][DBLP ] Performance Problem Determination Using Combined Dependency Analysis for Reliable System. [Citation Graph (, )][DBLP ] A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards. [Citation Graph (, )][DBLP ] Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes. [Citation Graph (, )][DBLP ] Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems. [Citation Graph (, )][DBLP ] A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter. [Citation Graph (, )][DBLP ] Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server. [Citation Graph (, )][DBLP ] A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP ]