Sciweavers

335 search results - page 56 / 67
» Biometrics and Security
Sort
View
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
15 years 8 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
15 years 8 months ago
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology
This paper describes how the curriculum and course format at the Air Force Institute of Technology (AFIT) has evolved based on our experience with the highly-successful Cyber Defe...
Barry E. Mullins, Timothy H. Lacey, Robert F. Mill...
107
Voted
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
15 years 7 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan
HICSS
2003
IEEE
141views Biometrics» more  HICSS 2003»
15 years 7 months ago
Understanding the Foundation of Mobile Content Quality A Presentation of a New Research Field
This paper studies some problems regarding mobile content quality (MCQ). Since the reason for communication is to be useful, we think that the only way of creating precise target ...
Pär Landor
109
Voted
HICSS
2000
IEEE
160views Biometrics» more  HICSS 2000»
15 years 6 months ago
Analysis of Coordinated Multilateral Trades
A new operating paradigm is still needed for the power industry in order to achieve a workable deregulated market. The two main proposals, namely the Bilateral and the Poolco mode...
Pierre-François D. Quet, Jose B. Cruz Jr., ...