Sciweavers

1401 search results - page 178 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
IDT
2008
123views more  IDT 2008»
13 years 9 months ago
A rich semantic model of track as a foundation for sharing beliefs regarding dynamic objects and events
: Many defense, homeland security, and commercial security objectives require continuous tracking of mobile entities such as aircraft. The systems that perform these functions prod...
Frederick Hayes-Roth, Curtis L. Blais
ICC
2007
IEEE
157views Communications» more  ICC 2007»
14 years 3 months ago
Secure Aggregation in Sensor Networks Using Neighborhood Watch
Abstract— Many sensor networks (SN) use in-network aggregation to minimize the amount of data transmitted by sensors. Unfortunately, aggregation makes the network more vulnerable...
Paul Rabinovich, Robert Simon
PET
2009
Springer
14 years 3 months ago
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications
We present the Vida family of abstractions of anonymous communication systems, model them probabilistically and apply Bayesian inference to extract patterns of communications and u...
George Danezis, Carmela Troncoso
NSPW
2003
ACM
14 years 2 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
CISS
2011
IEEE
13 years 20 days ago
New hypothesis testing-based methods for fault detection for smart grid systems
Abstract—Fault detection plays an indispensable role in ensuring the security of smart grid systems. Based on the dynamics of the generators, we show the time evolution of the sm...
Qian He, Rick S. Blum