Sciweavers

3349 search results - page 535 / 670
» Data Security
Sort
View
106
Voted
CORR
2006
Springer
100views Education» more  CORR 2006»
15 years 2 months ago
Authorised Translations of Electronic Documents
A concept is proposed to extend authorised translations of documents to electronically signed, digital documents. Central element of the solution is an electronic seal, embodied a...
Jan Piechalski, Andreas U. Schmidt
134
Voted
JSW
2008
164views more  JSW 2008»
15 years 2 months ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...
115
Voted
TR
2008
98views more  TR 2008»
15 years 2 months ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
111
Voted
JNW
2007
132views more  JNW 2007»
15 years 2 months ago
Genetic Algorithm for Hierarchical Wireless Sensor Networks
— Large scale wireless sensor networks (WSNs) can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, envir...
Sajid Hussain, Abdul Wasey Matin, Obidul Islam
BEHAVIOURIT
2004
122views more  BEHAVIOURIT 2004»
15 years 2 months ago
Adopters and non-adopters of internet stock trading in Singapore
This study examines the attitudes of adopters and non-adopters toward Internet stock trading in Singapore. Data were collected using a web-based questionnaire survey. Usable respon...
Thompson S. H. Teo, Margaret Tan, Suat Nee Peck