Sciweavers

294 search results - page 41 / 59
» Intrusion Monitoring in Process Control Systems
Sort
View
178
Voted
TASE
2008
IEEE
15 years 3 months ago
Modeling and Supervisory Control of Railway Networks Using Petri Nets
In this paper we deal with the problem of modeling railway networks with Petri nets so as to apply the theory of supervisory control for discrete event systems to automatically de...
Alessandro Giua, Carla Seatzu
120
Voted
AAAI
2006
15 years 4 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
121
Voted
EUROSYS
2008
ACM
16 years 17 days ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
SYSTOR
2010
ACM
15 years 8 months ago
Design and implementation of a generic resource sharing virtual time dispatcher
Virtual machine monitors, especially when used for server consolidation, need to enforce a predefined sharing of resources among the running virtual machines. We propose a new me...
Tal Ben-Nun, Yoav Etsion, Dror G. Feitelson
BMCBI
2007
182views more  BMCBI 2007»
15 years 3 months ago
Hybrid elementary flux analysis/nonparametric modeling: application for bioprocess control
Background: The progress in the "-omic" sciences has allowed a deeper knowledge on many biological systems with industrial interest. This knowledge is still rarely used ...
Ana P. Teixeira, Carlos Alves, Paula M. Alves, Man...