Sciweavers

152 search results - page 23 / 31
» Modeling dependencies in security risk management
Sort
View
WS
2005
ACM
14 years 3 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du
CCS
2009
ACM
14 years 2 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
JCP
2006
173views more  JCP 2006»
13 years 9 months ago
Database Intrusion Detection using Weighted Sequence Mining
Data mining is widely used to identify interesting, potentially useful and understandable patterns from a large data repository. With many organizations focusing on webbased on-lin...
Abhinav Srivastava, Shamik Sural, Arun K. Majumdar
MSOM
2010
77views more  MSOM 2010»
13 years 8 months ago
To Wave or Not to Wave? Order Release Policies for Warehouses with an Automated Sorter
Wave-based release policies are prevalent in warehouses with an automated sorter, and take different forms depending on how much waves overlap and whether the sorter is split for...
Jérémie Gallien, Théophane We...
DSS
2006
170views more  DSS 2006»
13 years 9 months ago
Adoption of internet banking: An empirical study in Hong Kong
This study investigates how customers perceive and adopt Internet Banking (IB) in Hong Kong. We developed a theoretical model based on the Technology Acceptance Model (TAM) with a...
T. C. Edwin Cheng, David Y. C. Lam, Andy C. L. Yeu...