Sciweavers

3605 search results - page 171 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
PERVASIVE
2006
Springer
14 years 10 months ago
Enhancing Security and Privacy in Traffic-Monitoring Systems
Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabad...
101
Voted
ISF
2008
114views more  ISF 2008»
14 years 10 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
HICSS
2009
IEEE
98views Biometrics» more  HICSS 2009»
15 years 5 months ago
Replicating and Sharing Computer Security Laboratory Environments
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of...
Kara L. Nance, Brian Hay, Ronald Dodge, James Wrub...