Sciweavers

132 search results - page 25 / 27
» Knowledge based crime scenario modelling
Sort
View
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
13 years 4 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
SIGSOFT
2005
ACM
14 years 11 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
SECON
2008
IEEE
14 years 4 months ago
Optimal Buffer Management Policies for Delay Tolerant Networks
—Delay Tolerant Networks are wireless networks where disconnections may occur frequently due to propagation phenomena, node mobility, and power outages. Propagation delays may al...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...
EON
2003
13 years 11 months ago
An Ontology-Driven Application to Improve the Prescription of Educational Resources to Parents of Premature Infants
CST’s Baby CareLink provides a ‘collaborative healthware’ environment for parents of premature infants that incorporates just-in-time learning as one means of knowledge explo...
Howard Goldberg, Alfredo Morales, David MacMillan,...
ATAL
2007
Springer
14 years 2 months ago
Model-based belief merging without distance measures
Merging operators try to define the beliefs of a group of agents according to the beliefs of each member of the group. Several model-based propositional belief merging operators h...
Verónica Borja Macías, Pilar Pozos P...