Sciweavers

3193 search results - page 112 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
ICRE
1996
IEEE
14 years 2 months ago
GeoOOA: Object-Oriented Analysis for Geographic Information Systems
We stress the need of a domain-tailored requirements engineering method for the development of GISapplications. To this end, we discuss three GISapplication scenarios, the so-call...
Georg Kösters, Bernd-Uwe Pagel, Hans-Werner S...
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 10 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja
ASM
2010
ASM
14 years 7 months ago
Lightweight Modeling of Java Virtual Machine Security Constraints
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly i...
Mark C. Reynolds
CORR
2010
Springer
254views Education» more  CORR 2010»
13 years 8 months ago
Information-Theoretic Analysis of an Energy Harvesting Communication System
—In energy harvesting communication systems, an exogenous recharge process supplies energy for the data transmission and arriving energy can be buffered in a battery before consu...
Omur Ozel, Sennur Ulukus
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 10 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan