Sciweavers

151 search results - page 3 / 31
» Considering Operational Security Risk during System Developm...
Sort
View
156
Voted
TES
2001
Springer
15 years 7 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
116
Voted
JIRS
2010
112views more  JIRS 2010»
15 years 1 months ago
Development and Evaluation of a Chase View for UAV Operations in Cluttered Environments
Civilian applications for UAVs will bring these vehicles into low flying areas cluttered with obstacles such as building, trees, power lines, and more importantly civilians. The h...
James T. Hing, Keith W. Sevcik, Paul Y. Oh
95
Voted
ACSAC
2009
IEEE
15 years 9 months ago
Computer-Related Risk Futures
: This paper reflects on many risks in the development and use of computer-related systems. It considers past and future alternatives, suggests some remedial approaches, and offe...
Peter G. Neumann
ICST
2009
IEEE
15 years 9 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
105
Voted
ITEE
2007
15 years 4 months ago
Knowledge Acquisition and Risk Analysis in Material Recovery Facilities by a Virtual Team
1 A knowledge acquisition process that has been implemented by a virtual team for the development of a knowledge based early warning system in Material Recovery Facilities (MRFs) o...
Ioannis M. Dokas, Konstantinos Kitis, Christos Dod...