Sciweavers

1353 search results - page 230 / 271
» Securing Current and Future Process Control Systems
Sort
View
121
Voted
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
15 years 8 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
138
Voted
MM
2010
ACM
252views Multimedia» more  MM 2010»
15 years 2 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
109
Voted
DEXAW
2008
IEEE
98views Database» more  DEXAW 2008»
15 years 9 months ago
Interface for Multidisciplinary Virtual Prototype Components
Computer-based concurrent engineering of products, denoted as Virtual Engineering (VE), is used extensively to meet the requirements of product development. Current research deals...
Stephan Vornholt, Ingolf Geist
CCS
2008
ACM
15 years 4 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
127
Voted
ICWS
2009
IEEE
15 years 11 months ago
SOA-Based Integration of the Internet of Things in Enterprise Services
Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply ...
Patrik Spiess, Stamatis Karnouskos, Dominique Guin...