Sciweavers

461 search results - page 25 / 93
» Protecting Transportation Infrastructure
Sort
View
CNSM
2010
13 years 6 months ago
Risk management in VoIP infrastructures using support vector machines
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Ol...
JNSM
2010
110views more  JNSM 2010»
13 years 4 months ago
Distributed Automatic Configuration of Complex IPsec-Infrastructures
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cr...
Michael Rossberg, Guenter Schaefer, Thorsten Struf...
COMGEO
2010
ACM
14 years 1 months ago
Access control systems for spatial data infrastructures and their administration
Today sophisticated concepts, languages and frameworks exist, that allow implementing powerful fine grained access control systems for protecting Web Services and spatial data in ...
Jan Herrmann
ROBOCUP
2004
Springer
118views Robotics» more  ROBOCUP 2004»
14 years 3 months ago
Approaching Urban Disaster Reality: The ResQ Firesimulator
The RoboCupRescue Simulation project aims at simulating large-scale disasters in order to explore coordination strategies helpful for real-life rescue missions. This can only be ac...
Timo A. Nüssle, Alexander Kleiner, Michael Br...
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
14 years 3 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty