The SCEAS System
Navigation Menu

Conferences in DBLP

(atc)
2008 (conf/atc/2008)


  1. Sensor Network Applications Implemented by Industry and Their Security Challenges. [Citation Graph (, )][DBLP]


  2. Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. [Citation Graph (, )][DBLP]


  3. Preventing DDoS Attacks Based on Credit Model for P2P Streaming System. [Citation Graph (, )][DBLP]


  4. Design, Prototype, and Evaluation of a Network Monitoring Library. [Citation Graph (, )][DBLP]


  5. Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN. [Citation Graph (, )][DBLP]


  6. A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  7. Using Automated Planning for Trusted Self-organising Organic Computing Systems. [Citation Graph (, )][DBLP]


  8. A Trusted Group Signature Architecture in Virtual Computing Environment. [Citation Graph (, )][DBLP]


  9. SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks. [Citation Graph (, )][DBLP]


  10. Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. [Citation Graph (, )][DBLP]


  11. An Integrated Solution for Policy Filtering and Traffic Anomaly Detection. [Citation Graph (, )][DBLP]


  12. Secure Safety: Secure Remote Access to Critical Safety Systems in Offshore Installations. [Citation Graph (, )][DBLP]


  13. SEMAP: Improving Multipath Security Based on Attacking Point in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  14. Scheduling for Reliable Execution in Autonomic Systems. [Citation Graph (, )][DBLP]


  15. Measuring and Analyzing Emerging Properties for Autonomic Collaboration Service Adaptation. [Citation Graph (, )][DBLP]


  16. Artificial Immune System Based Robot Anomaly Detection Engine for Fault Tolerant Robots. [Citation Graph (, )][DBLP]


  17. Maximising Personal Utility Using Intelligent Strategy in Minority Game. [Citation Graph (, )][DBLP]


  18. Simulation-Based Optimization Approach for Software Cost Model with Rejuvenation. [Citation Graph (, )][DBLP]


  19. Organic Control of Traffic Lights. [Citation Graph (, )][DBLP]


  20. Concepts for Autonomous Control Flow Checking for Embedded CPUs. [Citation Graph (, )][DBLP]


  21. Autonomous Querying for Knowledge Networks. [Citation Graph (, )][DBLP]


  22. Discovery of Useful Patterns from Tree-Structured Documents with Label-Projected Database. [Citation Graph (, )][DBLP]


  23. Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network. [Citation Graph (, )][DBLP]


  24. Self-reconfiguration in Highly Available Pervasive Computing Systems. [Citation Graph (, )][DBLP]


  25. Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose. [Citation Graph (, )][DBLP]


  26. An Evaluation Study of the Effectiveness of Modeling NASA Swarm-Based Exploration Missions with ASSL. [Citation Graph (, )][DBLP]


  27. Distributed Performance Control in Organic Embedded Systems. [Citation Graph (, )][DBLP]


  28. An Operating System Architecture for Organic Computing in Embedded Real-Time Systems. [Citation Graph (, )][DBLP]


  29. Towards an Autonomic Peer-to-Peer Middleware for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  30. Embedding Dynamic Behaviour into a Self-configuring Software System. [Citation Graph (, )][DBLP]


  31. Service Discovery of IP Cameras Using SIP and Zeroconf Protocols. [Citation Graph (, )][DBLP]


  32. Adaptability of the TRSIM Model to Some Changes in Agents Behaviour. [Citation Graph (, )][DBLP]


  33. Trusting Groups in Coalition Formation Using Social Distance. [Citation Graph (, )][DBLP]


  34. Adjustable Trust Model for Access Control. [Citation Graph (, )][DBLP]


  35. Towards Trustworthiness Establishment: A D-S Evidence Theory Based Scorer Reliability Tuned Method for Dishonest Feedback Filtering. [Citation Graph (, )][DBLP]


  36. A User Behavior Based Trust Model for Mobile Applications. [Citation Graph (, )][DBLP]


  37. Managing Contracts in Pleiades Using Trust Management. [Citation Graph (, )][DBLP]


  38. A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily. [Citation Graph (, )][DBLP]


  39. Annotation Markers for Runtime Replication Protocol Selection. [Citation Graph (, )][DBLP]


  40. Enhanced Three-Round Smart Card-Based Key Exchange Protocol. [Citation Graph (, )][DBLP]


  41. Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments. [Citation Graph (, )][DBLP]


  42. A Study of Information Security Practice in a Critical Infrastructure Application. [Citation Graph (, )][DBLP]


  43. Web Search Results Clustering Based on a Novel Suffix Tree Structure. [Citation Graph (, )][DBLP]


  44. Di-GAFR: Directed Greedy Adaptive Face-Based Routing. [Citation Graph (, )][DBLP]


  45. Cooperative Management Framework for Inter-domain Routing System. [Citation Graph (, )][DBLP]


  46. Performance Problem Determination Using Combined Dependency Analysis for Reliable System. [Citation Graph (, )][DBLP]


  47. A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards. [Citation Graph (, )][DBLP]


  48. Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes. [Citation Graph (, )][DBLP]


  49. Wireless Sensor Network Assisted Dynamic Path Planning for Transportation Systems. [Citation Graph (, )][DBLP]


  50. A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter. [Citation Graph (, )][DBLP]


  51. Intelligent VoIP System in Ad-Hoc Network with Embedded Pseudo SIP Server. [Citation Graph (, )][DBLP]


  52. A Weighted Routing Protocol Using Grey Relational Analysis for Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002