Sciweavers

3149 search results - page 216 / 630
» IT security risk management
Sort
View
SPRINGSIM
2007
13 years 10 months ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter
ICRA
2009
IEEE
153views Robotics» more  ICRA 2009»
14 years 4 months ago
Using critical junctures and environmentally-dependent information for management of tightly-coupled cooperation in heterogeneou
— This paper addresses the challenge of forming appropriate heterogeneous robot teams to solve tightly-coupled, potentially multi-robot tasks, in which the robot capabilities may...
Lynne E. Parker, Christopher M. Reardon, Heeten Ch...
SACMAT
2003
ACM
14 years 2 months ago
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
ECUMN
2007
Springer
14 years 3 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
ICSE
2000
IEEE-ACM
14 years 1 months ago
Software metrics: roadmap
Software metrics as a subject area is over 30 years old, but it has barely penetrated into mainstream software engineering. A key reason for this is that most software metrics act...
Norman E. Fenton, Martin Neil