Sciweavers

2904 search results - page 181 / 581
» Internet Infrastructure Security
Sort
View
HICSS
2007
IEEE
95views Biometrics» more  HICSS 2007»
15 years 10 months ago
Protecting with Sensor Networks: Attention and Response
Sensor networks are expected to play an important role in hybrid protection infrastructures when combined with robots and human decision makers. In order to be effective, detectio...
Jeffrey V. Nickerson, Stephan Olariu
GCC
2004
Springer
15 years 9 months ago
Applying Grid Technologies to Distributed Data Mining
The Grid promises improvements in the effectiveness with which global businesses are managed, if it enables distributed expertise to be efficiently applied to the analysis of dist...
Alastair C. Hume, Ashley D. Lloyd, Terence M. Sloa...
138
Voted
FC
2010
Springer
175views Cryptology» more  FC 2010»
15 years 5 months ago
Cryptographic Cloud Storage
We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We...
Seny Kamara, Kristin Lauter
NETWORK
2011
14 years 10 months ago
Selective jamming/dropping insider attacks in wireless mesh networks
—Wireless mesh networks (WMNs) promise to extend high-speed wireless connectivity beyond what is possible with the current WiFi-based infrastructure. However, their unique archit...
Loukas Lazos, Marwan Krunz
ICSE
1999
IEEE-ACM
15 years 8 months ago
Information Survivability Control Systems
We address the dependence of critical infrastructures— including electric power, telecommunications, finance and transportation—on vulnerable information systems. Our approach...
Kevin J. Sullivan, John C. Knight, Xing Du, Steve ...