Sciweavers

33 search results - page 4 / 7
» IT Security Protection at Field Level of Industrial Automati...
Sort
View
HICSS
2007
IEEE
88views Biometrics» more  HICSS 2007»
14 years 1 months ago
Promoting Digital Forensics Awareness through the University of Alaska Fairbanks ASSERT Center
As a Center of Academic Excellence (CAE) in Information Assurance Education, the University of Alaska Fairbanks is committed to promoting a culture of awareness and advancement of...
Kara L. Nance, Brian Hay, Christopher Hecker
WWW
2008
ACM
14 years 8 months ago
A systematic approach for cell-phone worm containment
Cell phones are increasingly becoming attractive targets of various worms, which cause the leakage of user privacy, extra service charges and depletion of battery power. In this w...
Liang Xie, Hui Song, Trent Jaeger, Sencun Zhu
WSC
2007
13 years 10 months ago
Reflective simulation for on-line workload planning and control
Since its beginning, simulation has been used to study complex systems in order to infer on their future behavior, in this field several applications have been made using it as of...
Roberto Revetria, Flavio Tonelli
CCS
2009
ACM
14 years 8 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
ANCS
2005
ACM
14 years 1 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna