Sciweavers

4511 search results - page 673 / 903
» Observation Based System Security
Sort
View
DEPCOS
2008
IEEE
96views Hardware» more  DEPCOS 2008»
15 years 10 months ago
Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application
Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is sp...
Lukasz Cyra, Janusz Górski
SCAM
2008
IEEE
15 years 10 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
AINA
2007
IEEE
15 years 10 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
ASIAN
2007
Springer
174views Algorithms» more  ASIAN 2007»
15 years 10 months ago
Combining Heterogeneous Classifiers for Network Intrusion Detection
Extensive use of computer networks and online electronic data and high demand for security has called for reliable intrusion detection systems. A repertoire of different classifier...
Ali Borji
HICSS
2006
IEEE
153views Biometrics» more  HICSS 2006»
15 years 9 months ago
IT Governance: Reviewing 17 IT Governance Tools and Analysing the Case of Novozymes A/S
Complexity in information technology architectures and infrastructures, and an increasing need for executives to verify and secure value generation processes in private as well as...
Michael Holm Larsen, Mogens Kühn Pedersen, Ki...