ASIASIM
13 years 11 months ago
2004 Springer
Abstract. Information security is a crucial technique for an organization to survive in these days. However, there is no integrated model to assess the security risk quantitatively...
ASIASIM
13 years 11 months ago
2004 Springer
A network security simulator becomes more useful for the study on the cyber incidents and their defense mechanisms, as cyber terrors have been increasingly popular. Until now, netw...
ASIASIM
13 years 11 months ago
2004 Springer
Abstract. Recently, flash memory is widely used in embedded applications since it has strong points: non-volatility, fast access speed, shock resistance, and low power consumption...
ASIASIM
13 years 11 months ago
2004 Springer
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
ASIASIM
13 years 11 months ago
2004 Springer
Abstract. It is important to simulate a groundwater transport process, e.g., pollutant migration, through the vadose zone and subsequent mixing within the saturated zone to assess ...
|