Sciweavers

104 search results - page 3 / 21
» The Emperor's New Security Indicators
Sort
View
COMCOM
2007
149views more  COMCOM 2007»
13 years 5 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao
DSN
2006
IEEE
13 years 9 months ago
Using Attack Injection to Discover New Vulnerabilities
Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this objective, the pape...
Nuno Ferreira Neves, João Antunes, Miguel C...
IEEEIAS
2009
IEEE
13 years 3 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
ESEM
2009
ACM
14 years 20 days ago
Using security metrics coupled with predictive modeling and simulation to assess security processes
: © Using Security Metrics Coupled with Predictive Modeling and Simulation to Assess Security Processes Yolanta Beres, Marco Casassa Mont, Jonathan Griffin, Simon Shiu HP Laborato...
Yolanta Beres, Marco Casassa Mont, Jonathan Griffi...
EUPROJECTS
2005
Springer
13 years 11 months ago
Patients and EHRs Tele Home Monitoring Reference Scenario
This scenario focuses on patients as users of Electronic Health Records (EHR) relevant information. The concrete field of applications is telemonitoring at home, a field where many...
Michael Pieper, Karl Stroetmann