Sciweavers

579 search results - page 109 / 116
» Secure Access to Medical Data over the Internet
Sort
View
WWW
2003
ACM
15 years 10 months ago
Evaluating SOAP for High Performance Business Applications: Real-Time Trading Systems
Web services, with an emphasis on open standards and flexibility, may provide benefits over existing capital markets integration practices. However, web services must first meet c...
Christopher Kohlhoff, Robert Steele
CCS
2005
ACM
15 years 3 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 2 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
85
Voted
OPODIS
2004
14 years 11 months ago
Firewall Queries
Firewalls are crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is t...
Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H...
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
PPP Migration: A Technique for Low-Latency Handoff in CDMA2000 Networks
In current CDMA2000 standard, a Packet Data Serving Node (PDSN) acts as an IP gateway to the Internet. Mobile Nodes (MN) connect to a PDSN using a Point-to-Point (PPP) session and...
Anand Kagalkar, Sarit Mukherjee, Sampath Rangaraja...