Sciweavers

3452 search results - page 555 / 691
» Secure Data Outsourcing
Sort
View
115
Voted
JSW
2008
164views more  JSW 2008»
15 years 23 days ago
Constraint-based Trend Template for Intrusion Detection
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...
TR
2008
98views more  TR 2008»
15 years 21 days ago
Application of Vulnerability Discovery Models to Major Operating Systems
A number of security vulnerabilities have been reported in the Windows, and Linux operating systems. Both the developers, and users of operating systems have to utilize significant...
Omar H. Alhazmi, Yashwant K. Malaiya
JNW
2007
132views more  JNW 2007»
15 years 21 days ago
Genetic Algorithm for Hierarchical Wireless Sensor Networks
— Large scale wireless sensor networks (WSNs) can be used for various pervasive and ubiquitous applications such as security, health-care, industry automation, agriculture, envir...
Sajid Hussain, Abdul Wasey Matin, Obidul Islam
89
Voted
BEHAVIOURIT
2004
122views more  BEHAVIOURIT 2004»
15 years 20 days ago
Adopters and non-adopters of internet stock trading in Singapore
This study examines the attitudes of adopters and non-adopters toward Internet stock trading in Singapore. Data were collected using a web-based questionnaire survey. Usable respon...
Thompson S. H. Teo, Margaret Tan, Suat Nee Peck
COMPSEC
2004
91views more  COMPSEC 2004»
15 years 20 days ago
Predicting the intrusion intentions by observing system call sequences
Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...