Sciweavers

438 search results - page 49 / 88
» Defending Critical Infrastructure
Sort
View
109
Voted
IEEECIT
2010
IEEE
14 years 11 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
109
Voted
ICPADS
2010
IEEE
14 years 10 months ago
Fault Tolerant Network Routing through Software Overlays for Intelligent Power Grids
Control decisions of intelligent devices in critical infrastructure can have a significant impact on human life and the environment. Insuring that the appropriate data is availabl...
Christopher Zimmer, Frank Mueller
141
Voted
CASES
2005
ACM
15 years 2 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
ICDE
2000
IEEE
197views Database» more  ICDE 2000»
16 years 1 months ago
SQLServer for Windows CE - A Database Engine for Mobile and Embedded Platforms
This paper presents an overview of Microsoft SQLServer for Windows CE. This is a database engine designed for mobile and embedded applications. The focus of the presentation is on...
Praveen Seshadri, Phil Garrett
104
Voted
WWW
2006
ACM
16 years 1 months ago
WS-replication: a framework for highly available web services
Due to the rapid acceptance of web services and its fast spreading, a number of mission-critical systems will be deployed as web services in next years. The availability of those ...
Jorge Salas, Francisco Perez-Sorrosal, Marta Pati&...