Sciweavers

1885 search results - page 161 / 377
» Methodology of distributed technological complex system simu...
Sort
View
130
Voted
FGIT
2009
Springer
15 years 9 months ago
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems .It is difficult to decide whether the sti...
YoungHan Choi, TaeGhyoon Kim, SeokJin Choi, CheolW...
GCC
2003
Springer
15 years 8 months ago
iCell: Integration Unit in Enterprise Cooperative Environment
An enterprise cooperative environment is combination of emerging technologies and methodologies on which both enterprise employee and customers can perform necessary business activ...
Ruey-Shyang Wu, Shyan-Ming Yuan, Anderson Liang, D...
CSREASAM
2004
15 years 4 months ago
Survivable Systems Analysis of the North American Power Grid Communications Infrastructure
The modern electric power grid is a complex interconnected network of independent physical and electronic devices that utilize myriad technologies for communication between other ...
Patrick R. Merry, Axel W. Krings, Paul W. Oman
WSC
2004
15 years 4 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
IEEECIT
2010
IEEE
15 years 1 months ago
A P2P REcommender System based on Gossip Overlays (PREGO)
—Gossip-based Peer-to-Peer protocols proved to be very efficient for supporting dynamic and complex information exchange among distributed peers. They are useful for building an...
Matteo Mordacchini, Ranieri Baraglia, Patrizio Daz...