Sciweavers

495 search results - page 8 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
ICDCS
2011
IEEE
12 years 7 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang
INCDM
2010
Springer
204views Data Mining» more  INCDM 2010»
13 years 11 months ago
Combining Business Process and Data Discovery Techniques for Analyzing and Improving Integrated Care Pathways
Hospitals increasingly use process models for structuring their care processes. Activities performed to patients are logged to a database but these data are rarely used for managin...
Jonas Poelmans, Guido Dedene, Gerda Verheyden, Her...
WWW
2008
ACM
14 years 8 months ago
Composite process oriented service discovery in preserving business and timed relation
This paper proposes an approach for solving the problem of composite process oriented service discovery with preserving business and timed relation. Key to our approach is the def...
Yu Dai, Lei Yang, Bin Zhang, Kening Gao
ESWS
2008
Springer
13 years 9 months ago
Simplifying the Web Service Discovery Process
One of the crucial reasons for adding semantic descriptions to Web services is to enable intelligent discovery, removing the need for a human to manually search and browse textual ...
Nathalie Steinmetz, Mick Kerrigan, Holger Lausen, ...
ESORICS
2010
Springer
13 years 8 months ago
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
The security risk of a network against unknown zero day attacks has been considered as something unmeasurable since software flaws are less predictable than hardware faults and the...
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven...