Sciweavers

1183 search results - page 142 / 237
» Risk Management with Benchmarking
Sort
View
IFIPTM
2009
119views Management» more  IFIPTM 2009»
15 years 2 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
JDCTA
2010
143views more  JDCTA 2010»
14 years 11 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
EGITALY
2011
14 years 4 months ago
Information Visualization on Organized Crime Trials
Today everyone on the Internet becomes an active writer. It is simpler than ever to produce and to share new knowledge on the net. Users risk to be overwhelmed by too much informa...
Lorenzo Di Silvestro, Giovanni Gallo, Giovanni Giu...
TON
2012
13 years 6 months ago
On New Approaches of Assessing Network Vulnerability: Hardness and Approximation
—Society relies heavily on its networked physical infrastructure and information systems. Accurately assessing the vulnerability of these systems against disruptive events is vit...
Thang N. Dinh, Ying Xuan, My T. Thai, Panos M. Par...
ASPLOS
2006
ACM
15 years 10 months ago
Software-based instruction caching for embedded processors
While hardware instruction caches are present in virtually all general-purpose and high-performance microprocessors today, many embedded processors use SRAM or scratchpad memories...
Jason E. Miller, Anant Agarwal