Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
4731
search results - page 53 / 947
»
Securing Interactive Programs
Sort
relevance
views
votes
recent
update
View
thumb
title
127
click to vote
CCE
2007
130
views
Software Engineering
»
more
CCE 2007
»
Water networks security: A two-stage mixed-integer stochastic program for sensor placement under uncertainty
15 years 4 months ago
Download
www.nt.ntnu.no
This work describes a stochastic approach for the optimal placement of sensors in municipal water networks to detect maliciously injected contaminants. The model minimizes the exp...
Vicente Rico-Ramírez, Sergio Frausto-Hern&a...
claim paper
Read More »
102
click to vote
JHSN
2006
67
views
more
JHSN 2006
»
SPEE: A Secure Program Execution Environment tool using code integrity checking
15 years 4 months ago
Download
www.seas.gwu.edu
Olga Gelbart, Bhagirath Narahari, Rahul Simha
claim paper
Read More »
106
click to vote
INTERNET
1998
81
views
more
INTERNET 1998
»
Securing Systems Against External Programs
15 years 3 months ago
Download
pages.cs.brandeis.edu
Brant Hashii, Manoj Lal, Raju Pandey, Steven Samor...
claim paper
Read More »
115
click to vote
SAC
2008
ACM
111
views
Applied Computing
»
more
SAC 2008
»
Universal concurrent constraint programing: symbolic semantics and applications to security
15 years 3 months ago
Download
www.lix.polytechnique.fr
Carlos Olarte, Frank D. Valencia
claim paper
Read More »
56
click to vote
IJORIS
2010
75
views
more
IJORIS 2010
»
Security Constrained Economic Dispatch: A Markov Decision Process Approach with Embedded Stochastic Programming
15 years 1 months ago
Download
web.ics.purdue.edu
Lizhi Wang, Nan Kong
claim paper
Read More »
« Prev
« First
page 53 / 947
Last »
Next »