Sciweavers

4 search results - page 1 / 1
» End-to-end Security in Telemedical Networks - A Practical Gu...
Sort
View
IJMI
2007
41views more  IJMI 2007»
13 years 4 months ago
End-to-end Security in Telemedical Networks - A Practical Guideline
Florian Wozak, Thomas Schabetsberger, Elske Ammenw...
BIS
2009
112views Business» more  BIS 2009»
13 years 2 months ago
Ontological Mapping of Information Security Best-Practice Guidelines
Abstract. Due to a rapid growth in the use of electronic data processing and networking, an information security management system with a holistic and widespread view becomes more ...
Stefan Fenz, Thomas Pruckner, Arman Manutscheri
TIFS
2008
149views more  TIFS 2008»
13 years 4 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
18
Voted
RTSS
2009
IEEE
13 years 11 months ago
Impact of Data Fusion on Real-Time Detection in Sensor Networks
—Real-time detection is an important requirement of many mission-critical wireless sensor network applications such as battlefield monitoring and security surveillance. Due to t...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang