Sciweavers

1353 search results - page 140 / 271
» Securing Current and Future Process Control Systems
Sort
View
96
Voted
DEXAW
1998
IEEE
82views Database» more  DEXAW 1998»
15 years 7 months ago
User Authentication in Multidatabase Systems
The aspect of security needs more consideration in the area of architectures for multidatabase systems. Particularly, the authentication of users which is a main prerequisite for ...
Eyk Hildebrandt, Gunter Saake
127
Voted
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 3 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
136
Voted
ISBRA
2010
Springer
15 years 10 months ago
Modeling without Borders: Creating and Annotating VCell Models Using the Web
Biological research is becoming increasingly complex and data-rich, with multiple public databases providing a variety of resources: hundreds of thousands of substances and interac...
Michael L. Blinov, Oliver Ruebenacker, James C. Sc...
149
Voted
MOBICOM
2004
ACM
15 years 9 months ago
PAVAN: a policy framework for content availabilty in vehicular ad-hoc networks
Advances in wireless communication, storage and processing are realizing next-generation in-vehicle entertainment systems. Even if hundreds of different video or audio titles are...
Shahram Ghandeharizadeh, Shyam Kapadia, Bhaskar Kr...
161
Voted
JIPS
2007
223views more  JIPS 2007»
15 years 3 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson