Sciweavers

77 search results - page 3 / 16
» Agile Security For Information Warfare: A Call For Research
Sort
View
HICSS
2008
IEEE
236views Biometrics» more  HICSS 2008»
14 years 1 months ago
A Case Study: Introducing eXtreme Programming in a US Government System Development Project
The US Military’s ability to meet its mission critical requirements calls for increased agility in its information technology development process. The purpose of this case study...
Ann L. Fruhling, Patrick McDonald, Christopher Dun...
EDBT
2004
ACM
139views Database» more  EDBT 2004»
14 years 7 months ago
GRIDS, Databases, and Information Systems Engineering Research
GRID technology, emerging in the late nineties, has evolved from a metacomputing architecture towards a pervasive computation and information utility. However, the architectural de...
Keith G. Jeffery
CORR
2011
Springer
156views Education» more  CORR 2011»
12 years 10 months ago
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
: Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most o...
Anjan K., Jibi Abraham, Mamatha Jadhav V.
SIGADA
2004
Springer
14 years 10 days ago
Information systems security engineering: a critical component of the systems engineering lifecycle
The purpose of this research paper is to illustrate the industrial and federal need for Information Systems Security Engineering (ISSE) in order to build Information Assurance (IA...
James F. Davis
SENSYS
2003
ACM
14 years 7 days ago
SIA: secure information aggregation in sensor networks
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sen...
Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perr...