Sciweavers

8135 search results - page 1365 / 1627
» network 2008
Sort
View
ISSA
2004
15 years 5 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche
ISSA
2004
15 years 5 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
IADIS
2003
15 years 5 months ago
A Framework of High Confidence E-Healthcare Information System
In this paper a framework for a high-confidence e-healthcare information system which meets five criteria including availability, reliability, security, survivability and restorab...
Shun-Chieh Lin, Wen-Hsiang Tsai, Shian-Shyong Tsen...
IADIS
2003
15 years 5 months ago
Personalization of Information Delivery by the Use of Agents
Mass, multi-channel, network access to information requires a solution of several problems related to proper information delivery, including an important problem of adjusting data...
Jarogniew Rykowskia, Arkadiusz Juszkiewicz
IADIS
2003
15 years 5 months ago
Personalized Context-Aware Presentation of Information to Mobile Users
One of the major challenges facing information systems today is that of finding relevant information to satisfy a user's request and presenting it in a preferred form. The po...
M. Howard Williams, D. Halvatzaras, Lars Mehrmann
« Prev « First page 1365 / 1627 Last » Next »