Sciweavers

2403 search results - page 365 / 481
» Cyberinsurance in IT Security Management
Sort
View
ETFA
2008
IEEE
14 years 2 months ago
An adaptive network architecture for home- and building environments
Fieldbus networks have significantly improved flexibility and management in classic building automation domains. However, the costs of such installations are still greatly affec...
Rolf Kistler, Stefan Knauth, Alexander Klapproth
ICCCN
2008
IEEE
14 years 2 months ago
Policy Distribution Methods for Function Parallel Firewalls
—Parallel firewalls offer a scalable low latency design for inspecting packets at high speeds. Typically consisting of an array of m firewalls, these systems filter arriving p...
Michael R. Horvath, Errin W. Fulp, Patrick Wheeler
IEEESCC
2008
IEEE
14 years 2 months ago
Built-to-Order Service Engineering for Enterprise IT Discovery
Enterprise IT environments are complex: business applications rely on distributed middleware running on diverse hardware with components depending on each other in many unexpected...
Nikolai Joukov, Murthy V. Devarakonda, Kostas Mago...
INFOCOM
2008
IEEE
14 years 2 months ago
Attack-Tolerant Time-Synchronization in Wireless Sensor Networks
—Achieving secure time-synchronization in wireless sensor networks (WSNs) is a challenging, but very important problem that has not yet been addressed effectively. This paper pro...
Xin Hu, Taejoon Park, Kang G. Shin
ISM
2008
IEEE
104views Multimedia» more  ISM 2008»
14 years 2 months ago
Provision of Quality of Service with Router Support
The current Internet servers are susceptible to network attacks. The DDoS attacks consume the network bandwidth and degrade the services provided by the servers. This paper propos...
Hongli Luo, Mei-Ling Shyu