Sciweavers

1845 search results - page 202 / 369
» From the Internet of Computers to the Internet of Things
Sort
View
MOBICOM
2000
ACM
15 years 6 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee
ISN
1997
Springer
15 years 5 months ago
End User Acceptance of Security Technology for Electronic Commerce
This paper examines the current advantages and limitations of the developing Global Information Infrastructure (GII) for commerce from the point of view of today’s players. It i...
Dale Whinnett
APSEC
2001
IEEE
15 years 5 months ago
A Framework for Migrating Procedural Code to Object-Oriented Platforms
With the rapid growth of the Internet and pervasive computing activities, the migration of back-end legacy systems to network centric environments has become a focal point for res...
Ying Zou, Kostas Kontogiannis
IADIS
2004
15 years 3 months ago
Using EAI to build public access Web-based information systems
Enterprise Application Integration (EAI) techniques are today widely adopted to build Enterprise Information Systems. Moreover the increasing reliability of tools and techniques s...
Nicola Aloia, Cesare Concordia, Sabrina Tardelli
VIIP
2001
15 years 3 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher