Sciweavers

45 search results - page 5 / 9
» Penetration Testing: A Duet
Sort
View
DAGSTUHL
2004
13 years 8 months ago
Testing with Functions as Specifications
Although computer systems penetrate all facets of society, the software running those systems may contain many errors. Producing high quality software appears to be difficult and v...
Pieter W. M. Koopman
CRITIS
2009
13 years 8 months ago
Energy Theft in the Advanced Metering Infrastructure
Abstract. Global energy generation and delivery systems are transitioning to a new computerized "smart grid". One of the principle components of the smart grid is an adva...
Stephen E. McLaughlin, Dmitry Podkuiko, Patrick Mc...
24
Voted
JUCS
2010
98views more  JUCS 2010»
13 years 5 months ago
Toward an Understanding of the Mediating Role of "Trust" in Mobile Banking Service: An Empirical Test of Indonesia Case
: Mobile banking has been considered to be one of the most value-added and important mobile services currently available. Considering the fact that the penetration of this technolo...
Chulmo Koo, Yulia Wati
IADIS
2003
13 years 8 months ago
E-Commerce Adoption Trajectories Among Manufacturing SMES
The intent of this paper is to provide empirically tested and validated metrics to capture the gradual adoption of ecommerce among manufacturing SMEs. The results suggest that e-c...
Élisabeth Lefebvre, Louis A. Lefebvre
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 7 months ago
Building Computer Network Attacks
In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack...
Ariel Futoransky, Luciano Notarfrancesco, Gerardo ...