Sciweavers

97 search results - page 20 / 20
» A Network Access Control Approach Based on the AAA Architect...
Sort
View
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 5 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
BPSC
2009
190views Business» more  BPSC 2009»
13 years 6 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann