Sciweavers

295 search results - page 41 / 59
» An Approach to Trust Management Challenges for Critical Infr...
Sort
View
CASES
2005
ACM
13 years 9 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
IPTPS
2004
Springer
14 years 1 months ago
Cluster Computing on the Fly: P2P Scheduling of Idle Cycles in the Internet
— Peer-to-peer computing, the harnessing of idle compute cycles throughout the Internet, offers exciting new research challenges in the converging domains of networking and distr...
Virginia Mary Lo, Daniel Zappala, Dayi Zhou, Yuhon...
CIDM
2009
IEEE
14 years 2 months ago
Mining for insider threats in business transactions and processes
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
William Eberle, Lawrence B. Holder
MKWI
2008
246views Business» more  MKWI 2008»
13 years 9 months ago
Assessing the effects of IT changes on IT risk - A business process-oriented view
Abstract: The economic relevance of IT risk is increasing due to various operational, technical as well as regulatory reasons. Increasing flexibility of business processes and risi...
Stefan Sackmann
INFOSCALE
2007
ACM
13 years 9 months ago
A model-based WiFi localization method
—Due to the proliferation of WiFi access points, indoor localization methods based on WiFi signal strengths are becoming more and more attractive because they don’t require add...
Dik Lun Lee, Qiuxia Chen