Sciweavers

5722 search results - page 16 / 1145
» Security Function Interactions
Sort
View
AGENTS
2000
Springer
14 years 29 days ago
The user interface as an agent environment
Theoretically motivated planning systems often make assumptions about their environments, in areas such as the predictability of action e ects, static behavior of the environment,...
Robert St. Amant, Luke S. Zettlemoyer
IEEEARES
2010
IEEE
14 years 3 months ago
Formalization of Viruses and Malware Through Process Algebras
Abstract—Abstract virology has seen the apparition of successive viral models, all based on Turing-equivalent formalisms. Considering recent malware, these are only partially cov...
Grégoire Jacob, Eric Filiol, Hervé D...
DSRT
1999
IEEE
14 years 28 days ago
Design and Implementation of a Distributed Interactive Simulation Security Architecture
The paper describes the design and implementation of a security architecture for a HLA/RTI prototype developed at ONERA/CERT. The major security objective is to protect the intell...
Pierre Bieber, Pierre Siron
SEC
2008
13 years 10 months ago
Interactive Selection of ISO 27001 Controls under Multiple Objectives
Abstract IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security standards provide a holistic approach to mitig...
Thomas Neubauer, Andreas Ekelhart, Stefan Fenz
WWW
2009
ACM
14 years 9 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang