Sciweavers

1353 search results - page 230 / 271
» Securing Current and Future Process Control Systems
Sort
View
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
15 years 9 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
MM
2010
ACM
252views Multimedia» more  MM 2010»
15 years 4 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
DEXAW
2008
IEEE
98views Database» more  DEXAW 2008»
15 years 10 months ago
Interface for Multidisciplinary Virtual Prototype Components
Computer-based concurrent engineering of products, denoted as Virtual Engineering (VE), is used extensively to meet the requirements of product development. Current research deals...
Stephan Vornholt, Ingolf Geist
149
Voted
CCS
2008
ACM
15 years 6 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
ICWS
2009
IEEE
16 years 1 months ago
SOA-Based Integration of the Internet of Things in Enterprise Services
Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply ...
Patrik Spiess, Stamatis Karnouskos, Dominique Guin...