Sciweavers

915 search results - page 94 / 183
» Security in Business Process Engineering
Sort
View
ISCAS
2007
IEEE
161views Hardware» more  ISCAS 2007»
14 years 3 months ago
Hardware Architecture of a Parallel Pattern Matching Engine
Abstract— Several network security and QoS applications require detecting multiple string matches in the packet payload by comparing it against predefined pattern set. This proc...
Meeta Yadav, Ashwini Venkatachaliah, Paul D. Franz...
DKE
2002
119views more  DKE 2002»
13 years 8 months ago
Enabling the creation of knowledge about software assets
In most companies two factors play a crucial role: managing the knowledge that is necessary for doing business and managing the hardware and software infrastructure that supports ...
Paul Klint, Chris Verhoef
IEEESP
2007
98views more  IEEESP 2007»
13 years 9 months ago
Educating Students to Create Trustworthy Systems
igh level of abstraction and to provide broad oversight. In contrast, the goal of computer science security education is to provide the technicalexpertisetodevelopsecure software a...
Richard S. Swart, Robert F. Erbacher
DEBS
2007
ACM
13 years 10 months ago
Identification of suspicious, unknown event patterns in an event cloud
This paper describes an approach to detect unknown event patterns. In this context, an event is not only something that happens, but also something that can be analysed. This task...
Alexander Widder, Rainer von Ammon, Philippe Schae...
JNW
2008
83views more  JNW 2008»
13 years 9 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...