Sciweavers

135 search results - page 24 / 27
» A conceptual framework for Group-Centric secure information ...
Sort
View
ICNS
2007
IEEE
14 years 2 months ago
Towards System-level Optimization for High Performance Unified Threat Management
To build holistic protection against complex and blended network threats, multiple security features need to be integrated into a unified security architecture, which requires in ...
Yaxuan Qi, Baohua Yang, Bo Xu, Jun Li
FPLAY
2008
13 years 9 months ago
Using genres to customize usability evaluations of video games
Video games are varied, with vastly different visual layouts and interaction styles; however, most games that share a common genre still have many user interface similarities. The...
David Pinelle, Nelson Wong, Tadeusz Stach
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
13 years 6 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
14 years 2 months ago
De-anonymizing Social Networks
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and da...
Arvind Narayanan, Vitaly Shmatikov
GRID
2007
Springer
14 years 1 months ago
Dynamic, context-aware, least-privilege grid delegation
— Performing delegation in large scale, dynamic and distributed environments with large numbers of shared resources is more challenging than inside local administrative domains. ...
Mehran Ahsant, Jim Basney, S. Lennart Johnsson