Sciweavers

1875 search results - page 231 / 375
» Modeling the Security of Steganographic Systems
Sort
View
72
Voted
HICSS
2009
IEEE
88views Biometrics» more  HICSS 2009»
15 years 7 months ago
Automatic Voltage Controllers for South Korean Power System
The paper proposes two automatic voltage controllers for the South Korean power system. Simulation results from detailed Korean power-flow models show that the controllers can pro...
Xing Liu, Vaithianathan Venkatasubramanian, Tae-Ky...
77
Voted
SAFECOMP
2005
Springer
15 years 6 months ago
Safety Interfaces for Component-Based Systems
Abstract. This paper addresses the problems appearing in componentbased development of safety-critical systems. We aim at efficient reasoning about safety at system level while add...
Jonas Elmqvist, Simin Nadjm-Tehrani, Marius Minea
102
Voted
ISARCS
2010
141views Hardware» more  ISARCS 2010»
15 years 4 months ago
Integrating Fault-Tolerant Techniques into the Design of Critical Systems
Abstract. Software designs equipped with specification of dependability techniques can help engineers to develop critical systems. In this work, we start to envision how a softwar...
Ricardo J. Rodríguez, José Merseguer
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
15 years 2 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
HT
2005
ACM
15 years 6 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver