Sciweavers

1737 search results - page 132 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
119
Voted
CODES
2004
IEEE
15 years 6 months ago
Low energy security optimization in embedded cryptographic systems
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
Catherine H. Gebotys
142
Voted
DBSEC
2008
188views Database» more  DBSEC 2008»
15 years 4 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
127
Voted
BIBM
2008
IEEE
145views Bioinformatics» more  BIBM 2008»
15 years 9 months ago
Meta Analysis of Microarray Data Using Gene Regulation Pathways
Using microarray technology for genetic analysis in biological experiments requires computationally intensive tools to interpret results. The main objective here is to develop a â...
Saira Ali Kazmi, Yoo-Ah Kim, Baikang Pei, Ravi Nor...
118
Voted
AINA
2007
IEEE
15 years 9 months ago
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
Abstract— Structured peer-to-peer systems have grown enormously because of their scalability, efï¬ciency and reliability. These systems assign a unique identiï¬er to each user ...
Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Pa...
130
Voted
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 9 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...