Sciweavers

294 search results - page 19 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
INCDM
2007
Springer
96views Data Mining» more  INCDM 2007»
14 years 2 months ago
Neural Business Control System
Small to medium sized companies require a business control mechanism in order to monitor their modus operandi and analyse whether they are achieving their goals. A tool for the dec...
María Lourdes Borrajo Diz, Juan M. Corchado...
SACMAT
2010
ACM
14 years 1 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
ISCAPDCS
2004
13 years 10 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
JIPS
2006
110views more  JIPS 2006»
13 years 8 months ago
Monitoring Systems for Embedded Equipment in Ubiquitous Environments
: Accurate and efficient monitoring of dynamically changing environments is one of the most important requirements for ubiquitous network environments. Ubiquitous computing provide...
Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park, Jung-Ho...
IEEECIT
2010
IEEE
13 years 7 months ago
Research on Key Technologies of Building Home Control Based on the Wireless Network
: Relatively higher cost, worse extensibility of the monitoring points and weaker mobility are those disadvantages that widely exist in the wire data collection system of the tradi...
Si-You Xiao, Xuan Zhang