Sciweavers

8503 search results - page 188 / 1701
» Secure Software Architectures
Sort
View
ACSW
2006
15 years 3 months ago
SKMA: a key management architecture for SCADA systems
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently...
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel ...
ISIM
2007
15 years 3 months ago
Software Architectures for Real-time Embedded Applications for Broadcasting
The paper discusses a choice of appropriate software architecture with regards to the specifications of embedded applications as information systems particularly used in area of ra...
Otto Zeleznik, Zdenek Havlice
IWSAPF
2000
15 years 6 months ago
Software Connectors and Refinement in Family Architectures
Product families promote reuse of software artifacts such as architectures, designs and implementations. Product family architectures are difficult to create due to the need to sup...
Alexander Egyed, Nikunj R. Mehta, Nenad Medvidovic
184
Voted
JIPS
2010
195views more  JIPS 2010»
14 years 9 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
ASPLOS
2006
ACM
15 years 8 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...