Sciweavers

102 search results - page 7 / 21
» Secure and Dependable Patterns in Organizations: An Empirica...
Sort
View
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
14 years 4 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...
JIPS
2010
162views more  JIPS 2010»
13 years 4 months ago
Intercepting Filter Approach to Injection Flaws
The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy's increasing depen...
Ahmed Salem
JUCS
2010
150views more  JUCS 2010»
13 years 8 months ago
SOM Clustering to Promote Interoperability of Directory Metadata: A Grid-Enabled Genetic Algorithm Approach
: Directories provide a general mechanism for describing resources and enabling information sharing within and across organizations. Directories must resolve differing structures a...
Lei Li, Vijay K. Vaishnavi, Art Vandenberg
JNW
2008
83views more  JNW 2008»
13 years 9 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
ICCS
2003
Springer
14 years 3 months ago
Export Behaviour Modeling Using EvoNF Approach
The academic literature suggests that the extent of exporting by multinational corporation subsidiaries (MCS) depends on their product manufactured, resources, tax protection, cus...
Ron Edwards, Ajith Abraham, Sonja Petrovic-Lazarev...