Sciweavers

325 search results - page 7 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
AAMAS
2008
Springer
13 years 7 months ago
Using quantitative models to search for appropriate organizational designs
As the scale and scope of distributed and multi-agent systems grow, it becomes increasingly important to design and manage the participants' interactions. The potential for b...
Bryan Horling, Victor R. Lesser
DESRIST
2009
Springer
129views Education» more  DESRIST 2009»
14 years 5 days ago
C-K design theory for information systems research
Design science is slowly but surely establishing itself as a recognized paradigm for conducting research in information systems. Researchers in the IS field have tried to study d...
Jan Ondrus, Yves Pigneur
JDCTA
2010
136views more  JDCTA 2010»
13 years 2 months ago
The Design and Development of Testing Information System of Psychodiagnosis for Equestrianism Players
Combining with the characteristics of equestrian sports and the psycho diagnosis technology and using the tools such as Visual Basic, Photoshop, Microsoft Access, Psychodiagnosis ...
Bin Wang, Gaofeng Pan, Xin Li, Chunyan Su
PADS
2009
ACM
14 years 2 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
14 years 8 months ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau