Sciweavers

224 search results - page 15 / 45
» Composable Tools For Network Discovery and Security Analysis
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
WORDS
2005
IEEE
14 years 1 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
DSOM
2006
Springer
13 years 11 months ago
Using Argumentation Logic for Firewall Policy Specification and Analysis
Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. ...
Arosha K. Bandara, Antonis C. Kakas, Emil C. Lupu,...
GLOBECOM
2007
IEEE
14 years 1 months ago
Discovering Topologies at Router Level: Part II
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...
NN
2008
Springer
150views Neural Networks» more  NN 2008»
13 years 7 months ago
Neural network based pattern matching and spike detection tools and services - in the CARMEN neuroinformatics project
In the study of information flow in the nervous system, component processes can be investigated using a range of electrophysiological and imaging techniques. Although data is diff...
Martyn Fletcher, Bojian Liang, Leslie Smith, Alast...