Sciweavers

468 search results - page 50 / 94
» The System Administration Maturity Model - SAMM
Sort
View
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
14 years 2 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...
IDEAL
2005
Springer
14 years 1 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
ECAL
2007
Springer
13 years 12 months ago
Genotype Reuse More Important than Genotype Size in Evolvability of Embodied Neural Networks
odel of Embodiment on Abstract Systems: from Hierarchy to Heterarchy Kohei Nakajima, Soya Shinkai, Takashi Ikegami A Behavior-Based Model of the Hydra, Phylum Cnidaria Malin Aktius...
Chad W. Seys, Randall D. Beer
ER
2000
Springer
151views Database» more  ER 2000»
13 years 11 months ago
Algebraic Database Migration to Object Technology
Relational database systems represent the current standard technology for implementing database applications. Now that the object-oriented paradigm becomes more and more mature in...
Andreas Behm, Andreas Geppert, Klaus R. Dittrich
CORR
2010
Springer
128views Education» more  CORR 2010»
13 years 8 months ago
Random Oracles in a Quantum World
Once quantum computers reach maturity most of today's traditional cryptographic schemes based on RSA or discrete logarithms become vulnerable to quantum-based attacks. Hence, ...
Özgür Dagdelen, Marc Fischlin, Anja Lehm...