Sciweavers

536 search results - page 34 / 108
» Embedding Information Security into the Organization
Sort
View
ISVC
2007
Springer
14 years 2 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
JMS
2010
139views more  JMS 2010»
13 years 6 months ago
Application of Portable CDA for Secure Clinical-document Exchange
Health Level Seven (HL7) organization published the Clinical Document Architecture (CDA) for exchanging documents among heterogeneous systems and improving medical quality based on...
Kuo-Hsuan Huang, Sung-huai Hsieh, Yuan-Jen Chang, ...
AGENTS
1997
Springer
14 years 9 days ago
Designing Behaviors for Information Agents
To facilitate the rapid development and open system interoperability of autonomous agents we need to carefully specify and effectively implement various classes of agent behaviors...
Keith Decker, Anandeep Pannu, Katia P. Sycara, Mik...
IWANN
2005
Springer
14 years 1 months ago
Manifold Constrained Finite Gaussian Mixtures
In many practical applications, the data is organized along a manifold of lower dimension than the dimension of the embedding space. This additional information can be used when le...
Cédric Archambeau, Michel Verleysen
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
14 years 2 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...