Sciweavers

1737 search results - page 254 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
104
Voted
IJNSEC
2007
119views more  IJNSEC 2007»
15 years 2 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
127
Voted
JSAC
2008
165views more  JSAC 2008»
15 years 2 months ago
Energy-Efficient Routing Schemes for Underwater Acoustic Networks
Interest in underwater acoustic networks has grown rapidly with the desire to monitor the large portion of the world covered by oceans. Fundamental differences between underwater a...
Michele Zorzi, Paolo Casari, Nicola Baldo, Albert ...
138
Voted
STORAGESS
2005
ACM
15 years 8 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
134
Voted
SBP
2010
Springer
15 years 7 months ago
Social Network Data and Practices: The Case of Friendfeed
Due to their large worldwide adoption, Social Network Sites (SNSs) have been widely used in many global events as an important source to spread news and information. While the sear...
Fabio Celli, F. Marta L. Di Lascio, Matteo Magnani...
111
Voted
BMCBI
2010
137views more  BMCBI 2010»
15 years 2 months ago
Biana: a software framework for compiling biological interactions and analyzing networks
Background: The analysis and usage of biological data is hindered by the spread of information across multiple repositories and the difficulties posed by different nomenclature sy...
Javier Garcia-Garcia, Emre Guney, Ramon Aragues, J...