Sciweavers

21 search results - page 3 / 5
» Disaster recovery planning: a strategy for data security
Sort
View
112
Voted
NETWORK
2006
96views more  NETWORK 2006»
15 years 21 days ago
A wireless biosensor network using autonomously controlled animals
Recent research shows that animals can be guided remotely by stimulating regions of the brain. Therefore, it is possible to set up an animal wireless sensor network for search and...
Yihan Li, Shivendra S. Panwar, Shiwen Mao
ACSAC
2004
IEEE
15 years 4 months ago
Attack Plan Recognition and Prediction Using Causal Networks
Correlating and analyzing security alerts is a critical and challenging task in security management. Recently, some techniques have been proposed for security alert correlation. H...
Xinzhou Qin, Wenke Lee
CCS
2009
ACM
16 years 1 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin
100
Voted
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
15 years 6 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
118
Voted
AISM
2004
15 years 2 months ago
Understanding Challenges of Information Security Culture: A Methodological Issue
Although, many organisations have implemented technical solutions to protect information resources from adverse events, internal security breaches continue to occur. Therefore an ...
Omar Zakaria