Sciweavers

762 search results - page 128 / 153
» Modeling and Simulating Information Security Management
Sort
View
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
13 years 9 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
CONTEXT
2007
Springer
14 years 1 months ago
MDD Approach for the Development of Context-Aware Applications
Context-aware systems offer entirely new opportunities for application developers and for end users by gathering context information and adapting systems behavior accordingly. Sev...
Dhouha Ayed, Didier Delanote, Yolande Berbers
SEKE
2009
Springer
14 years 6 days ago
Improving Negotiations through Fuzzy Cognitive Maps
In a decision-making process, a systematic method to manage and measure negotiation aspects provides crucial information to negotiators and has emerged as a key factor to determin...
Sérgio Assis Rodrigues, Tiago Santos da Sil...
TWC
2008
138views more  TWC 2008»
13 years 7 months ago
LKE: A Self-Configuring Scheme for Location-Aware Key Establishment in Wireless Sensor Networks
Symmetric key agreement is significant to security provisioning in sensor networks with resource limitations. A number of pairwise key pre-distribution protocols have been proposed...
Fang Liu, Xiuzhen Cheng
PODS
2011
ACM
163views Database» more  PODS 2011»
12 years 10 months ago
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module executions used to produce a data item, as well as the parameter settings and intermediate...
Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debm...