Sciweavers

1353 search results - page 68 / 271
» Securing Current and Future Process Control Systems
Sort
View
ICLP
2010
Springer
15 years 7 months ago
Models for Trustworthy Service and Process Oriented Systems
Abstract. Service and process-oriented systems promise to provide more effective business and work processes and more flexible and adaptable enterprise IT systems. However, the t...
Hugo A. López
HOTOS
1997
IEEE
15 years 7 months ago
Operating Systems for Component Software Environments
Although component software has emerged as one of the most significant and commercially successful technologies of the past few years, few operating systems are designed to host a...
Noah Mendelsohn
ICST
2009
IEEE
15 years 10 months ago
Seasonal Variation in the Vulnerability Discovery Process
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
HyunChul Joh, Yashwant K. Malaiya
110
Voted
ACSAC
2008
IEEE
15 years 9 months ago
New Side Channels Targeted at Passwords
Side channels are typically viewed as attacks that leak cryptographic keys during cryptographic algorithm processing, by observation of system side effects. In this paper, we pres...
Albert Tannous, Jonathan T. Trostle, Mohamed Hassa...
IV
2009
IEEE
124views Visualization» more  IV 2009»
15 years 9 months ago
Needs Assessment for the Design of Information Synthesis Visual Analytics Tools
Information synthesis is a key portion of the analysis process with visual analytics tools. This stage of work requires users to collect, organize, and add meaning to individual a...
Anthony C. Robinson