Sciweavers

1353 search results - page 101 / 271
» Securing Current and Future Process Control Systems
Sort
View
HASE
2008
IEEE
15 years 10 months ago
Securing Sensor Nodes Against Side Channel Attacks
Side channel attacks are non-invasive attacks in which adversaries gain confidential information by passively observing the target computing device. Sensor nodes are particularly...
Kanthakumar Pongaliur, Zubin Abraham, Alex X. Liu,...
CDC
2009
IEEE
136views Control Systems» more  CDC 2009»
15 years 7 months ago
A probabilistic approach to air traffic complexity evaluation
Assessing air traffic complexity on a mid term horizon can help to timely identify those safety-critical encounter situations that would require many tactical resolution maneuvers ...
Maria Prandini, Jianghai Hu
SIGUCCS
2000
ACM
15 years 7 months ago
Computer Abuse, Information Technologies and Judicial Affairs
Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Elizabeth Mackenzie, Kathryn Goldman
125
Voted
RTS
2006
106views more  RTS 2006»
15 years 3 months ago
Q-SCA: Incorporating QoS support into software communications architecture for SDR waveform processing
The Software Communications Architecture (SCA) defined by Joint Tactical Radio Systems (JTRS) is the de facto standard middleware currently adopted by the Software Defined Radio (...
Jaesoo Lee, Saehwa Kim, Jiyong Park, Seongsoo Hong
143
Voted
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
15 years 9 months ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré