Sciweavers

5722 search results - page 1064 / 1145
» Security Function Interactions
Sort
View
IADIS
2004
15 years 3 months ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
129
Voted
ISSA
2004
15 years 3 months ago
Applying Similarities Between Immune Systems And Mobile Agent Systems In Intrusion Detection
Nearly all present-day commercial intrusion detection systems are based on a hierarchical architecture. Nodes at the bottom of the hierarchy collect information, which is passed t...
Marek Zielinski
IADIS
2003
15 years 3 months ago
Paradigm Shifts and Business Processes: A Case Study
The vast majority of IT systems are implemented using a traditional procedural paradigm approach using a suitable procedural language such as COBOL. However, with recent developme...
Paul Maclear, Paul Darbyshire
ECIS
2000
15 years 3 months ago
The Learning Administration - Shaping Change and Taking Off into the Future
- E-services will change the future of business as well as private relationships. The rearrangement of value chains, new competitive arenas and the growing necessity and interest i...
Hans-Jörg Bullinger, Werner Brettreich-Teichm...
137
Voted
IM
1997
15 years 3 months ago
Switchlets and Dynamic Virtual ATM Networks
This paper presents a novel approach to the control and management of ATM networks, by allowing di erent control architectures to be operational within the same network, and on th...
Jacobus E. van der Merwe, Ian M. Leslie
« Prev « First page 1064 / 1145 Last » Next »