Sciweavers

13 search results - page 2 / 3
» Challenges for the Protection of Critical ICT-Based Financia...
Sort
View
SECPERU
2006
IEEE
13 years 11 months ago
Service-Oriented Security Architecture for CII based on Sensor Networks
The extraordinary growth of the Information Society is originating a high dependency on ICT. This provokes that those strongly interrelated technological infrastructures, as well ...
Javier Lopez, José A. Montenegro, Rodrigo R...
IAJIT
2010
96views more  IAJIT 2010»
13 years 4 months ago
DDoS Incidents and their Impact: A Review
: The phenomenal growth and success of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defence are operated. No...
Monika Sachdeva, Gurvinder Singh, Krishan Kumar, K...
IJDE
2002
145views more  IJDE 2002»
13 years 5 months ago
Cyber Forensics: A Military Operations Perspective
This paper discusses some of the unique military requirements and challenges in Cyber Forensics. A definition of Cyber Forensics is presented in a military context. Capabilities n...
Joseph Giordano, Chester Maciag
ISSA
2004
13 years 7 months ago
The Protection Of Public Health Data - A Case Study
South Africa's health system consists of a large public sector and a smaller but fast-growing private sector. Health care varies from the most basic primary health care, offe...
S. Nkundlaa
CMS
2001
119views Communications» more  CMS 2001»
13 years 7 months ago
Vulnerabilities and Security Limitations of current IP Telephony Systems
Abstract Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part o...
Ralf Ackermann, Markus Schumacher, Utz Roedig, Ral...