Sciweavers

11539 search results - page 9 / 2308
» On Learning from Exercises
Sort
View
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
14 years 1 months ago
e-Government and Cyber Security: The Role of Cyber Security Exercises
e-Government operations are increasing with citizen demand for timely and cost effective services. Security associated with individual systems is similar to many e-commerce soluti...
Art Conklin, Gregory B. White
PADS
2009
ACM
14 years 2 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu

Book
2111views
15 years 3 months ago
Tcl/Tk for Programmers: With Solved Exercises that Work with Unix and Windows
"The book is written for looking things up but do not expect all things to be present. Use your on-line manual if you do not see what you need in the book. Look for additional...
J. Adrian Zimmer
SBP
2012
Springer
12 years 2 months ago
Lessons Learned in Using Social Media for Disaster Relief - ASU Crisis Response Game
In disasters such as the earthquake in Haiti and the tsunami in Japan, people used social media to ask for help or report injuries. The popularity, efficiency, and ease of use of s...
Mohammad Ali Abbasi, Shamanth Kumar, Jose Augusto ...
TC
2008
13 years 7 months ago
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise
Abstract--Testing security systems is challenging because a system's authors have to play the double role of attackers and defenders. Red Team/Blue Team exercises are an inval...
Jelena Mirkovic, Peter L. Reiher, Christos Papadop...