Sciweavers

SECURWARE
2008
IEEE
14 years 6 months ago
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, suc...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Ga...
SECURWARE
2008
IEEE
14 years 6 months ago
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
— Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL cust...
Yannick Carlinet, Ludovic Mé, Hervé ...
SECURWARE
2008
IEEE
14 years 6 months ago
Optimal Trust Network Analysis with Subjective Logic
Trust network analysis with subjective logic (TNA-SL) simplifies complex trust graphs into series-parallel graphs by removing the most uncertain paths to obtain a canonical graph...
Audun Jøsang, Touhid Bhuiyan
SECURWARE
2008
IEEE
14 years 6 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
SECURWARE
2008
IEEE
14 years 6 months ago
From Monitoring Templates to Security Monitoring and Threat Detection
Abstract. This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks support...
Nuno Amálio, George Spanoudakis
IV
2008
IEEE
99views Visualization» more  IV 2008»
14 years 6 months ago
An Interview-Based User Study on the use of Visualizations for Folder Browsing
Hierarchically structured data collections often need to be visualized for the purposes of digital information management and presentation. File browsing, in particular, has an in...
Maria Golemati, Akrivi Katifori, Eugenia G. Gianno...
ISECS
2008
IEEE
14 years 6 months ago
Probability of Attack Based on System Vulnerability Life Cycle
—The proliferation of exploit codes greatly expedites attacks in cyber world. This research compiles important dates on vulnerability from various sources into five patterns of l...
Amontip Jumratjaroenvanit, Yunyong Teng-amnuay
ISECS
2008
IEEE
14 years 6 months ago
Assessing the Impact of Information Technology on Supply Chain Management
: Companies attempt to companies are attempting to find ways to improve their flexibility and responsiveness and in turn competitiveness by changing their operations strategy, meth...
Mehdi Fasanghari
ISECS
2008
IEEE
14 years 6 months ago
Key Technology and System Design in Mobile Supply Chain Management
Mobile supply chain management is increasingly recognized as an area offering significant potential for generating improvements and creating competitive advantage to corporations....
Qi Yuan, Zhao Xiaokang, Zhang Qiong
ISECS
2008
IEEE
14 years 6 months ago
A Regression-based Coordination for Concurrent Negotiation
Given that resource providers and consumers may have different requirements and performance goals, concurrent negotiation is considered in this work to successfully obtain commitm...
Benyun Shi, Kwang Mong Sim