Augmenting Surveillance System Capabilities by Exploiting Event Correlation and Distributed Attack Detection
Francesco Flammini
,
Nicola Mazzocca
,
Alfio Pappalardo
,
Concetta Pragliola
,
Valeria Vittorini
Conference papers
hal-01590404v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More
A Security Policy Model for Agent Based Service-Oriented Architectures
Eckehard Hermann
Conference papers
hal-01590399v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More
A Study on Context Services Model with Location Privacy
Hoon Ko
,
Goreti Marreiros
,
Zita Vale
,
Jongmyung Choi
Conference papers
hal-01590410v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More
A Handover Security Mechanism Employing Diffie-Hellman PKDS for IEEE802.16e Wireless Networks
Fang-Yie Leu
,
Yi-Fu Ciou
,
Yi-Li Huang
Conference papers
hal-01590385v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More
A Risk-Based Evaluation of Group Access Control Approaches in a Healthcare Setting
Maria B. Line
,
Inger Anne Tøndel
,
Erlend Andreas Gjære
Conference papers
hal-01590398v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More
Health Care Reform and the Internet
Patricia Mactaggart
,
Stephanie Fiore
Conference papers
hal-01590392v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More
Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices
Leandro Marin
,
Antonio J. Jara
,
Antonio Skarmeta
Conference papers
hal-01590400v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More
Learning Web Application Firewall - Benefits and Caveats
Dariusz Pałka
,
Marek Zachara
Conference papers
hal-01590402v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More
VMBLS: Virtual Machine Based Logging Scheme for Prevention of Tampering and Loss
Masaya Sato
,
Toshihiro Yamauchi
Conference papers
hal-01590411v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More
IT Issues on Homeland Security and Defense
Kangbin Yim
,
Ilsun You
Conference papers
hal-01590403v1
Actions
Share
Gmail
Facebook
X
LinkedIn
More