Sciweavers

117 search results - page 13 / 24
» csreasam 2007
Sort
View
CSREASAM
2006
14 years 9 days ago
Stochastic Modeling of Worm Propagation in Trusted Networks
- There are two types of models useful in the study of worm propagation for a given number of terminals in a trusted network i.e. deterministic and stochastic model. The determinis...
Vivek Kumar Sehgal
CSREASAM
2006
14 years 9 days ago
Data Security and wireless networks: mutually exclusive?
- The increased use and popularity of wireless networks has seen their adoption in medical information systems. They provide the advantages of mobility and instant information avai...
Andrew Woodward
CSREASAM
2006
14 years 9 days ago
Software Vaccine Technique and Its Application in Early Virus
: The paper introduces a new anti-virus idea of Software Vaccine technique. It can apply the security technique inside the software itself. By inserting the software vaccine into t...
Xiaodong Yuan, Dajiong Yue
CSREASAM
2006
14 years 9 days ago
Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System
- Data collection mechanism is a crucial factor for the performance of intrusion detection system (IDS). Simple random sampling and Stratified random sampling techniques of statist...
Kuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexi...
CSREASAM
2006
14 years 9 days ago
On Achieving Trustworthy SOA-Based Web Services
This work is inspired by the intend to construct SOABased E-Government. We first emphasize the importance of taking measures for solving security problems facing Web Services, we ...
Jianwu Zheng, Mingsheng Liu, Hui Liu