Sciweavers

1353 search results - page 187 / 271
» Securing Current and Future Process Control Systems
Sort
View
123
Voted
USENIX
2007
15 years 6 months ago
From STEM to SEAD: Speculative Execution for Automated Defense
Most computer defense systems crash the process that they protect as part of their response to an attack. Although recent research explores the feasibility of selfhealing to autom...
Michael E. Locasto, Angelos Stavrou, Gabriela F. C...
ACSAC
2007
IEEE
15 years 10 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
POLICY
2004
Springer
15 years 9 months ago
Policy-Based Mobile Ad Hoc Network Management
Ad hoc networking is the basis of the future military network-centric warfare architecture. Such networks are highly dynamic in nature, as mobile ad hoc networks are formed over w...
Ritu Chadha, Hong Cheng, Yuu-Heng Cheng, Cho-Yu Ja...
128
Voted
ECIS
2004
15 years 5 months ago
Implementing Information Systems to support knowledge work: an exploration of work motifs
The research presented in this paper is part of a larger study of the organizational impacts of information systems on knowledge work. The phase of the research reported in the pa...
Christopher J. Davis, Ellen M. Hunagel
124
Voted
FLAIRS
2010
15 years 1 months ago
Game Based Training for Fighter Pilots
How could computer games be used to augment training for fighter pilots? This paper is aimed at providing one answer to this research question. Three current methods of training f...
Jeremy Ludwig, Robert Richards, Jeff Lovelace