P Gurdjos, P Sturm - 2003 IEEE Computer Society Conference …, 2003 - ieeexplore.ieee.org
We consider the problem of camera self-calibration from images of a planar object with unknown Euclidean structure. The general case of possibly varying focal length is …
This paper introduces an autonomic model-based cyber security management approach for the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting …
This paper introduces a model-based autonomic security management (ASM) approach to estimate, detect and identify security attacks along with planning a sequence of actions to …
S Fayssal, S Hariri, Y Al-Nashif - 2007 Fourth Annual …, 2007 - ieeexplore.ieee.org
The exponential growth in wireless network faults, vulnerabilities, and attacks make the wireless local area network (WLAN) security management a challenging research area …
Self-aware computer systems will be capable of adapting their behavior and resources thousands of times a second to automatically find the best way to accomplish a given goal …
FM Sibai, DA Menascé - 2011 Third International Conference …, 2011 - ieeexplore.ieee.org
There has been a constant growing security concern on insider attacks on network accessible computer systems. Users with power credentials can do almost anything they …
SK Alampalayam, EF Natsheh - International Journal of Business …, 2008 - igi-global.com
Detection of malicious, compromised and selfish node attacks is urgently needed to protect Mobile Ad hoc Networks (MANET) and their applications from failures. Once a MANET …
F Alomari, DA Menasce - 2012 IEEE Sixth International …, 2012 - ieeexplore.ieee.org
The back-end databases of multi-tiered applications are a major data security concern for enterprises. The problem becomes more critical with the proliferation of enterprise hosted …