Sciweavers

16070 search results - page 244 / 3214
» Identifying
Sort
View
COMPSEC
2006
110views more  COMPSEC 2006»
15 years 5 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
EOR
2006
105views more  EOR 2006»
15 years 5 months ago
Evaluating cost taxonomies for information systems management
The consideration of costs, benefits and risks underpin many Information System (IS) evaluation decisions. Yet, vendors and project-champions alike tend to identify and focus much...
Zahir Irani, Ahmad Ghoneim, Peter E. D. Love
IJNVO
2008
85views more  IJNVO 2008»
15 years 5 months ago
Analysing trust as a means of improving the effectiveness of the virtual supply chain
: This article focuses on trust within interorganisational virtual organisations, which are regarded as legally separate but operationally interdependent companies focused on respo...
Ian Paterson, Heather Maguire, Latif Al-Hakim
IANDC
2006
101views more  IANDC 2006»
15 years 5 months ago
Mind change efficient learning
This paper studies efficient learning with respect to mind changes. Our starting point is the idea that a learner that is efficient with respect to mind changes minimizes mind cha...
Wei Luo, Oliver Schulte
IJSWIS
2008
108views more  IJSWIS 2008»
15 years 5 months ago
Identity of Resources and Entities on the Web
One of the main strengths of the web is that it allows any party of its global community to share information with any other party. This goal has been achieved by making use of a u...
Valentina Presutti, Aldo Gangemi