Sciweavers

160 search results - page 10 / 32
» Privacy-preserving data publishing: A survey of recent devel...
Sort
View
HUC
2009
Springer
15 years 2 months ago
A Survey on Localization for Mobile Wireless Sensor Networks
Over the past decade we have witnessed the evolution of wireless sensor networks, with advancements in hardware design, communication protocols, resource efficiency, and other aspe...
Isaac Amundson, Xenofon D. Koutsoukos
SEC
2007
14 years 11 months ago
A Survey of Bots Used for Distributed Denial of Service Attacks
Abstract. In recent years, we have seen the arrival of Distributed Denial-ofService (DDoS) open-source bot-based attack tools facilitating easy code enhancement, and so resulting i...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
70
Voted
CIKM
2009
Springer
15 years 4 months ago
Walking in the crowd: anonymizing trajectory data for pattern analysis
Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. In this paper, we study the privacy threats in trajectory data pub...
Noman Mohammed, Benjamin C. M. Fung, Mourad Debbab...
METRICS
2005
IEEE
15 years 3 months ago
Validation of New Theses on Off-the-Shelf Component Based Development
Using OTS (Off-The-Shelf) components in software development has become increasingly popular in the IT industry. OTS components can be either COTS (Commercial-Off-The-Shelf), or O...
Jingyue Li, Reidar Conradi, Odd Petter N. Slyngsta...
HICSS
2008
IEEE
113views Biometrics» more  HICSS 2008»
15 years 4 months ago
Development and Validation of Scales to Measure the Strategic Potential of IT-Enabled Resources: A Resource-Based Approach
This paper describes the development of reliable and valid scales for assessing the strategic potential of IT-enabled resources. Following to the resource-based view of the firm (...
Saggi Nevo, Michael R. Wade