Sciweavers

186 search results - page 7 / 38
» Operational Characteristics of an Automated Intrusion Respon...
Sort
View
IJDE
2007
105views more  IJDE 2007»
14 years 9 months ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka
92
Voted
GIS
1999
ACM
15 years 1 months ago
Integrating Geographic Information Systems, Spatial Digital Libraries and Information Spaces for Conducting Humanitarian Assista
The GeoWorlds system integrates geographic information systems, spatial digital libraries and other information analysis, retrieval and collaboration tools. It supports multiple a...
Vished Kumar, Alejandro Bugacov, Murilo Coutinho, ...
DAC
2000
ACM
15 years 10 months ago
Power analysis of embedded operating systems
The increasing complexity and software content of embedded systems has led to the common use of sophisticated system software that helps applications use the underlying hardware r...
Robert P. Dick, Ganesh Lakshminarayana, Anand Ragh...
ICCBR
1999
Springer
15 years 1 months ago
Is CBR Applicable to the Coordination of Search and Rescue Operations? A Feasibility Study
In response to the occurrence of an air incident, controllers at one of the three Canadian Rescue Coordination Centers (RCC) must make a series of critical decisions on the appropr...
Irène Abi-Zeid, Qiang Yang, Luc Lamontagne
75
Voted
DSS
2000
107views more  DSS 2000»
14 years 9 months ago
MarketNet: protecting access to information systems through financial market controls
This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for mal...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...