Sciweavers

151 search results - page 13 / 31
» Considering Operational Security Risk during System Developm...
Sort
View
WSC
2007
13 years 11 months ago
A public health application of data analysis for homeland security
This presentation follows up the talk last year to WINFORMS (The Washington Institute for Operations Research and The Management Sciences) in which an approach developed for the a...
Marjorie Greene, Robert Eek
ISSE
2011
13 years 3 months ago
Time-triggered buffers for event-based middleware systems
Application developers utilizing event-based middleware have sought to leverage domain-specific modeling for the advantages of intuitive specification, code synthesis, and suppo...
Jonathan Sprinkle, Brandon Eames
DEXA
1998
Springer
119views Database» more  DEXA 1998»
14 years 1 months ago
Building Consistent Sample Databases to Support Information System Evolution and Migration
Prototype databases are needed in any information system development process to support data-intensive applications development. It is common practice to populate these databases u...
Jesus Bisbal, Bing Wu, Deirdre Lawless, Jane Grims...
INFOCOM
2009
IEEE
14 years 3 months ago
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
Abstract—Wireless sensor networks are considered ideal candidates for a wide range of applications. It is desirable and sometimes necessary to reprogram sensor nodes through wire...
An Liu, Peng Ning, Chun Wang
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 3 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...