Sciweavers

2337 search results - page 389 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
STORAGESS
2006
ACM
14 years 1 months ago
Using free web storage for data backup
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to e...
Avishay Traeger, Nikolai Joukov, Josef Sipek, Erez...
CCS
2003
ACM
14 years 29 days ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
UIST
2004
ACM
14 years 1 months ago
"Killer App" of wearable computing: wireless force sensing body protectors for martial arts
Ubiquitous and Wearable Computing both have the goal of pushing the computer into the background, supporting all kinds of human activities. Application areas include areas such as...
Ed Huai-hsin Chi, Jin Song, Greg Corbin
GI
2007
Springer
14 years 1 months ago
An Object Oriented Approach for Data Fusion
: An new object oriented development suite for data fusion is presented. It is shown how the various issues in the data fusion development like design, implementation, simulation a...
Kaeye Dästner, Thomas Kausch, Felix Opitz
WIKIS
2006
ACM
14 years 1 months ago
Constrained Wiki: an Oxymoron?
In this paper we propose a new wiki concept — light constraints — designed to encode community best practices and domain-specific requirements, and to assist in their applica...
Angelo Di Iorio, Stefano Zacchiroli