Sciweavers

595 search results - page 54 / 119
» Survivability Analysis of Network Specifications
Sort
View
RAID
2000
Springer
15 years 7 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
BMCBI
2008
163views more  BMCBI 2008»
15 years 4 months ago
The Annotation, Mapping, Expression and Network (AMEN) suite of tools for molecular systems biology
Background: High-throughput genome biological experiments yield large and multifaceted datasets that require flexible and user-friendly analysis tools to facilitate their interpre...
Frédéric Chalmel, Michael Primig
JNW
2008
116views more  JNW 2008»
15 years 2 months ago
Scalable Revocation in Hybrid Ad Hoc Networks: The SHARL Scheme
The article proposes a simple, scalable and robust scheme for the distribution of revocation information in mobile ad hoc networks (MANETs). The scheme is intended for ad hoc netwo...
Mona Holsve Ofigsbø, Anne Marie Hegland, P&...
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
15 years 9 months ago
Community Collective Efficacy: Structure and Consequences of Perceived Capacities in the Blacksburg Electronic Village
Bandura’s social cognitive construct “perceived selfefficacy” has been used widely to understand individual behavior as a function of domain-specific beliefs about personal ...
John M. Carroll, Debbie Denise Reese
ECIS
2004
15 years 5 months ago
Context Engineering: An IS Development Research Agenda
The authors present the Context Engineering (CE) approach to Information Systems Development (ISD) as a framework to organise ideas about previous development experience and to gu...
Licinio Roque, Ana Almeida, António Dias de...