Sciweavers

438 search results - page 33 / 88
» Defending Critical Infrastructure
Sort
View
TELECARE
2004
132views Healthcare» more  TELECARE 2004»
13 years 10 months ago
Federated management of information for TeleCARE
Distributed information management plays a fundamental role within the base infrastructure supporting the elderly care domain. Specificities of this domain include the autonomy and...
Hamideh Afsarmanesh, Víctor Guevara-Mas&iac...
PAISI
2007
Springer
14 years 2 months ago
Security Assessment for Application Network Services Using Fault Injection
Vulnerabilities in network protocol software have been problematic since Internet infrastructure was deployed. These vulnerabilities damage the reliability of network software and ...
Hyungwoo Kang, Dong Hoon Lee
OTM
2009
Springer
14 years 3 months ago
Ontology-Driven Provenance Management in eScience: An Application in Parasite Research
Provenance, from the French word “provenir”, describes the lineage or history of a data entity. Provenance is critical information in scientific applications to verify experime...
Satya Sanket Sahoo, D. Brent Weatherly, Raghava Mu...
DIMVA
2004
13 years 10 months ago
Alarm Reduction and Correlation in Intrusion Detection Systems
: Large Critical Complex Infrastructures are increasingly dependent on IP networks. Reliability by redundancy and tolerance are an imperative for such dependable networks. In order...
Tobias Chyssler, Stefan Burschka, Michael Semling,...
IAJIT
2010
96views more  IAJIT 2010»
13 years 7 months ago
DDoS Incidents and their Impact: A Review
: The phenomenal growth and success of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defence are operated. No...
Monika Sachdeva, Gurvinder Singh, Krishan Kumar, K...