Sciweavers

438 search results - page 34 / 88
» Defending Critical Infrastructure
Sort
View
RAID
2005
Springer
14 years 2 months ago
Virtual Playgrounds for Worm Behavior Investigation
To detect and defend against Internet worms, researchers have long hoped to have a safe convenient environment to unleash and run real-world worms for close observation of their in...
Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H....
GECCO
1999
Springer
116views Optimization» more  GECCO 1999»
14 years 1 months ago
Dynamic Degree Constrained Network Design: A Genetic Algorithm Approach
The design and development of network infrastructure to support mission-critical operations has become a critical and complicated issue. In this study we explore the use of geneti...
Chao-Hsien Chu, G. Premkumar, Carey Chou, Jianzhon...
ACSW
2006
13 years 10 months ago
SKMA: a key management architecture for SCADA systems
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently...
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel ...
IJDE
2002
145views more  IJDE 2002»
13 years 8 months ago
Cyber Forensics: A Military Operations Perspective
This paper discusses some of the unique military requirements and challenges in Cyber Forensics. A definition of Cyber Forensics is presented in a military context. Capabilities n...
Joseph Giordano, Chester Maciag
DSN
2007
IEEE
14 years 3 months ago
On a Modeling Framework for the Analysis of Interdependencies in Electric Power Systems
Nowadays, economy, security and quality of life heavily depend on the resiliency of a number of critical infrastructures, including the Electric Power System (EPS), through which ...
Silvano Chiaradonna, Paolo Lollini, Felicita Di Gi...