Sciweavers

151 search results - page 3 / 31
» Considering Operational Security Risk during System Developm...
Sort
View
TES
2001
Springer
14 years 11 days ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
JIRS
2010
112views more  JIRS 2010»
13 years 6 months ago
Development and Evaluation of a Chase View for UAV Operations in Cluttered Environments
Civilian applications for UAVs will bring these vehicles into low flying areas cluttered with obstacles such as building, trees, power lines, and more importantly civilians. The h...
James T. Hing, Keith W. Sevcik, Paul Y. Oh
ACSAC
2009
IEEE
14 years 2 months ago
Computer-Related Risk Futures
: This paper reflects on many risks in the development and use of computer-related systems. It considers past and future alternatives, suggests some remedial approaches, and offe...
Peter G. Neumann
ICST
2009
IEEE
14 years 2 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
ITEE
2007
13 years 9 months ago
Knowledge Acquisition and Risk Analysis in Material Recovery Facilities by a Virtual Team
1 A knowledge acquisition process that has been implemented by a virtual team for the development of a knowledge based early warning system in Material Recovery Facilities (MRFs) o...
Ioannis M. Dokas, Konstantinos Kitis, Christos Dod...