Sciweavers

1737 search results - page 126 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
137
Voted
CCS
2009
ACM
15 years 6 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
110
Voted
ICIP
2001
IEEE
16 years 4 months ago
Use of neural networks for behaviour understanding in railway transport monitoring applications
In the last years, the interest for advanced video-based surveillance applications is more and more growing. This is especially true in the field of railway urban transport where ...
Claudio Sacchi, Carlo S. Regazzoni, Gianluca Gera,...
ICC
2009
IEEE
146views Communications» more  ICC 2009»
15 years 8 days ago
Multi-Hop Aggregate Information Efficiency in Wireless Ad Hoc Networks
Abstract--We introduce multi-hop aggregate information efficiency (MIEA), a comprehensive metric that captures several performance-affecting factors of wireless ad hoc networks in ...
Pedro Henrique Juliano Nardelli, Giuseppe Thadeu F...
CORR
2010
Springer
133views Education» more  CORR 2010»
15 years 2 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja
120
Voted
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
15 years 7 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind