Sciweavers

2575 search results - page 471 / 515
» Providing security with insecure systems
Sort
View
CCGRID
2006
IEEE
15 years 6 months ago
An Extensible Resource Discovery Mechanism for Grid Computing Environments
Grid computing is emerging as a new infrastructure to provide collaborative and secure resource sharing over multiple geographically distributed organizations. In this scenario, r...
Tania Gomes Ramos, Alba Cristina Magalhaes Alves d...
DSN
2006
IEEE
15 years 6 months ago
VoIP Intrusion Detection Through Interacting Protocol State Machines
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing ...
Hemant Sengar, Duminda Wijesekera, Haining Wang, S...
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Video Analysis and Compression on the STI Cell Broadband Engine Processor
With increased concern for physical security, video surveillance is becoming an important business area. Similar camera-based system can also be used in such diverse applications ...
Lurng-Kuo Liu, Sreeni Kesavarapu, Jonathan Connell...
ISSTA
2006
ACM
15 years 5 months ago
Coverage metrics for requirements-based testing
In black-box testing, one is interested in creating a suite of tests from requirements that adequately exercise the behavior of a software system without regard to the internal st...
Michael W. Whalen, Ajitha Rajan, Mats Per Erik Hei...
ITICSE
2006
ACM
15 years 5 months ago
Don't be a phish: steps in user education
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced i...
Stefan A. Robila, James W. Ragucci