Sciweavers

1353 search results - page 235 / 271
» Securing Current and Future Process Control Systems
Sort
View
200
Voted
LCN
2008
IEEE
15 years 9 months ago
Key management in wireless sensor networks with inter-network sensor roaming
Wireless Sensor Networks (WSNs) have received considerable attention in recent years and opened up new possibilities for various commercial and industrial applications. A WSN cons...
S. Choi, V. Sarangan, S. Trost
156
Voted
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 6 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
CHI
2004
ACM
16 years 3 months ago
Ambient agoras: InfoRiver, SIAM, Hello.Wall
This demonstration reports results from the EU-funded project Ambient Agoras, investigating future applications of ubiquitous and ambient computing in workspaces. Instead of prese...
Thorsten Prante, Richard Stenzel, Carsten Röc...
137
Voted
GECCO
2005
Springer
149views Optimization» more  GECCO 2005»
15 years 8 months ago
There's more to a model than code: understanding and formalizing in silico modeling experience
Mapping biology into computation has both a domain specific aspect – biological theory – and a methodological aspect – model development. Computational modelers have implici...
Janet Wiles, Nicholas Geard, James Watson, Kai Wil...
128
Voted
CCS
2007
ACM
15 years 8 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder