Sciweavers

526 search results - page 33 / 106
» Increase honeypot security through data analysis
Sort
View
151
Voted
BPM
2007
Springer
258views Business» more  BPM 2007»
15 years 8 months ago
Access Control Requirements for Processing Electronic Health Records
There is currently a strong focus worldwide on the potential of large-scale Electronic Health Record systems to cut costs and improve patient outcomes through increased efficiency....
Bandar Alhaqbani, Colin J. Fidge
125
Voted
FC
2009
Springer
112views Cryptology» more  FC 2009»
15 years 11 months ago
Data Hemorrhages in the Health-Care Sector
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including pri...
M. Eric Johnson
ACSAC
2005
IEEE
15 years 10 months ago
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach
With the increasing security threats from infrastructure attacks such as worms and distributed denial of service attacks, it is clear that the cooperation among different organiza...
Dingbang Xu, Peng Ning
BMCBI
2008
93views more  BMCBI 2008»
15 years 4 months ago
SlowFaster, a user-friendly program for slow-fast analysis and its application on phylogeny of Blastocystis
Background: Slow-fast analysis is a simple and effective method to reduce the influence of substitution saturation, one of the causes of phylogenetic noise and long branch attract...
Martin Kostka, Magdalena Uzlikova, Ivan Cepicka, J...
229
Voted
TON
2012
13 years 7 months ago
Exploiting Data Fusion to Improve the Coverage of Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) have been increasingly available for critical applications such as security surveillance and environmental monitoring. An important perfo...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang...