Sciweavers

1949 search results - page 128 / 390
» Protective Interface Specifications
Sort
View
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
14 years 4 months ago
A Language and Architecture for Automating Multimedia Content Production on Grid
Possible solutions to the management of multichannel delivering, production on demand, and containment of sale prices in the digital multimedia content production could be the aut...
Pierfrancesco Bellini, Ivan Bruno, Paolo Nesi
INFOCOM
2006
IEEE
14 years 4 months ago
Network Protocol System Fingerprinting - A Formal Approach
— Network protocol system fingerprinting has been recognized as an important issue and a major threat to network security. Prevalent works rely largely on human experiences and i...
Guoqiang Shu, David Lee
ACISP
2005
Springer
14 years 3 months ago
Analysis of the HIP Base Exchange Protocol
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
ISPEC
2005
Springer
14 years 3 months ago
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience
: Threats for today’s production networks range from fully automated worms and viruses to targeted, highly sophisticated multi-phase attacks carried out manually. In order to pro...
Stephan Riebach, Erwin P. Rathgeb, Birger Töd...
HICSS
2003
IEEE
114views Biometrics» more  HICSS 2003»
14 years 3 months ago
A UML-Driven Enterprise Architecture Case Study
The U.S. Capitol Police (USCP) are responsible for protecting the Capitol Hill complex encompassing the Senate and House office buildings and the Capitol building. Currently, the ...
Frank Armour, Stephen H. Kaisler, Jim Getter, Doug...