Sciweavers

26 search results - page 4 / 6
» Threat Response: A Compelling Application for Wearable Compu...
Sort
View
DFN
2003
13 years 8 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
WSC
2007
13 years 9 months ago
Agent-based modeling and simulation: desktop ABMS
Agent-based modeling and simulation (ABMS) is a new approach to modeling systems comprised of autonomous, interacting agents. ABMS promises to have far-reaching effects on the way...
Charles M. Macal, Michael J. North
WSC
2008
13 years 9 months ago
Agent-based modeling and simulation: ABMS examples
Agent-based modeling and simulation (ABMS) is a new approach to modeling systems comprised of autonomous, interacting agents. ABMS promises to have far-reaching effects on the way...
Charles M. Macal, Michael J. North
COMPUTER
2004
80views more  COMPUTER 2004»
13 years 7 months ago
Radiation Detection with Distributed Sensor Networks
Given the heightened awareness and response to threats posed to national security, it is important to evaluate, and if possible, improve current measures being taken to ensure our...
Sean M. Brennan, Angela M. Mielke, David C. Torney...
ACMSE
2006
ACM
14 years 1 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin