Sciweavers

3516 search results - page 237 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
146
Voted
IFIP
1993
Springer
15 years 7 months ago
Plant Engineering: Conceptual Modeling and Modular Design of a Computer Aided Environment
When designing a plant for continuous or semi-continuous processes, such as paper pulp or petrochemical production systems, engineers face very complex tasks, which are only in pa...
Cláudio Walter, José Palazzo M. de O...
133
Voted
CCR
2008
86views more  CCR 2008»
15 years 3 months ago
An Integrated Model of Traffic, Geography and Economy in the Internet
Modeling Internet growth is important both for understanding the current network and to predict and improve its future. To date, Internet models have typically attempted to explai...
Petter Holme, Josh Karlin, Stephanie Forrest
138
Voted
SOUPS
2010
ACM
15 years 7 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
133
Voted
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
16 years 3 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
135
Voted
ESORICS
2009
Springer
16 years 4 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou