Sciweavers

579 search results - page 89 / 116
» Secure Access to Medical Data over the Internet
Sort
View
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
15 years 2 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...
IHI
2010
197views Healthcare» more  IHI 2010»
14 years 8 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
107
Voted
ACMSE
2006
ACM
15 years 7 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
CORR
2007
Springer
139views Education» more  CORR 2007»
15 years 1 months ago
SkyServer Traffic Report - The First Five Years
The SkyServer is an Internet portal to the Sloan Digital Sky Survey Catalog Archive Server. From 2001 to 2006, there were a million visitors in 3 million sessions generating 170 mi...
Vik Singh, Jim Gray, Ani Thakar, Alexander S. Szal...
NDSS
2006
IEEE
15 years 7 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...