Sciweavers

347 search results - page 50 / 70
» Development of Threat Evaluation Tool for Distributed Networ...
Sort
View
USS
2008
13 years 9 months ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May
ASWEC
2006
IEEE
14 years 1 months ago
Formal Verification of the IEEE 802.11i WLAN Security Protocol
With the increased usage of wireless LANs (WLANs), businesses and educational institutions are becoming more concerned about wireless network security. The latest WLAN security pr...
Elankayer Sithirasenan, Saad Zafar, Vallipuram Mut...
DAC
1997
ACM
13 years 11 months ago
InfoPad - An Experiment in System Level Design and Integration
The InfoPad project was started at UC Berkeley in 1992 to investigate the issues involved in providing multimedia information access using a portable, wireless terminal. It quickl...
Robert W. Brodersen
COLCOM
2009
IEEE
14 years 2 days ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
IFIP3
1998
106views Education» more  IFIP3 1998»
13 years 8 months ago
Conception and Realization of the Offline Navigator in the Virtual University
The concept of the Virtual University offers a new learning environment for distance education. All the functionalities of a conventional university are available to the students ...
Thomas Demuth, Andreas Rieke, Dagmar Sommer