Sciweavers

IEEESP
2008
136views more  IEEESP 2008»
13 years 11 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...
IEEESP
2008
42views more  IEEESP 2008»
13 years 11 months ago
Why and How to Perform Fraud Experiments
Markus Jakobsson, Peter Finn, Nathaniel A. Johnson
IEEESP
2008
37views more  IEEESP 2008»
13 years 11 months ago
Privacy and Identity Management
Marit Hansen, Ari Schwartz, Alissa Cooper
IEEESP
2008
46views more  IEEESP 2008»
13 years 11 months ago
Usable Global Network Access Policy for Process Control Systems
David M. Nicol, William H. Sanders, Sankalp Singh,...
IEEESP
2008
82views more  IEEESP 2008»
13 years 11 months ago
Securing Information Transfer in Distributed Computing Environments
Siani Pearson, Marco Casassa Mont, Manny Novoa
IEEESP
2008
50views more  IEEESP 2008»
13 years 11 months ago
Use Cases for Identity Management in E-Government
Robin McKenzie, Malcolm Crompton, Colin Wallis
IEEESP
2008
45views more  IEEESP 2008»
13 years 11 months ago
State of Application Assessment
John Steven
IEEESP
2008
90views more  IEEESP 2008»
13 years 11 months ago
Combating the Insider Cyber Threat
Frank L. Greitzer, Abdrew P. Moore, Dawn M. Cappel...