Sciweavers

2270 search results - page 345 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
AI
2010
Springer
15 years 7 months ago
Automatic Discovery of Network Applications: A Hybrid Approach
Automatic discovery of network applications is a very challenging task which has received a lot of attentions due to its importance in many areas such as network security, QoS prov...
Mahbod Tavallaee, Wei Lu, Ebrahim Bagheri, Ali A. ...
MAGS
2008
169views more  MAGS 2008»
15 years 4 months ago
ACVisualizer: A visualization tool for APi-calculus
Process calculi are mathematical tools used for modeling and analyzing the structure and behavior of reactive systems. One such calculus, called APi-calculus (an extension to Pi-ca...
Raheel Ahmad, Shahram Rahimi
CCS
2006
ACM
15 years 7 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
OOPSLA
2005
Springer
15 years 9 months ago
DOSC: dispersed operating system computing
Over the past decade the sheer size and complexity of traditional operating systems have prompted a wave of new approaches to help alleviate the services provided by these operati...
Ramesh K. Karne, Karthick V. Jaganathan, Nelson Ro...
WSC
2004
15 years 5 months ago
Operational Analysis Framework for Emergency Operations Center Preparedness Training
As the U.S. Department of Homeland Security works to create an integrated emergency response system, it is evident that computer-based solutions can support this process. Individu...
Eytan Pollak, Mark Falash, Lorie Ingraham, Vivian ...