Sciweavers

148 search results - page 18 / 30
» Ethics in Security Vulnerability Research
Sort
View
IJNSEC
2006
156views more  IJNSEC 2006»
14 years 11 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
SENSYS
2003
ACM
15 years 5 months ago
SIA: secure information aggregation in sensor networks
Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sen...
Bartosz Przydatek, Dawn Xiaodong Song, Adrian Perr...
ISI
2004
Springer
15 years 5 months ago
Critical Infrastructure Integration Modeling and Simulation
The protection of critical infrastructures, such as electrical power grids, has become a primary concern of many nation states in recent years. Critical infrastructures involve mul...
William J. Tolone, David Wilson, Anita Raja, Wei-N...
104
Voted
GD
2008
Springer
15 years 25 days ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
TC
2008
14 years 11 months ago
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise
Abstract--Testing security systems is challenging because a system's authors have to play the double role of attackers and defenders. Red Team/Blue Team exercises are an inval...
Jelena Mirkovic, Peter L. Reiher, Christos Papadop...