Sciweavers

1266 search results - page 1 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
JISE
2006
67views more  JISE 2006»
13 years 4 months ago
Threat Evaluation Method for Distributed Network Environment
Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Jin-Young ...
CAI
2005
Springer
13 years 4 months ago
Development of Threat Evaluation Tool for Distributed Network Environment
Current information protection systems only detect and warn against individual intrusion, and are not able to provide a collective and synthesized alert message. In this paper, we ...
Keun-Hee Han, Il-Gon Kim, Kang-Won Lee, Ji-Yeon Ch...
IWEC
2008
13 years 6 months ago
Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment
The ability to simulate a seaport environment, including illicit cargo and the sensors designed to detect such cargo, allows the evaluation of alternative detection methods in orde...
Allen Christiansen, Damian Johnson, Lawrence B. Ho...
IPSN
2011
Springer
12 years 8 months ago
Sensor networks for the detection and tracking of radiation and other threats in cities
This paper presents results from experiments, mathematical analysis, and simulations of a network of static and mobile sensors for detecting threats on city streets and in open ar...
Annie H. Liu, Julian J. Bunn, K. Mani Chandy
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
13 years 9 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang