Trust management and security in the future communication-based" smart" electric power grid
J Fadul, K Hopkinson, C Sheffield…�- …�Hawaii International�…, 2011 - ieeexplore.ieee.org
… mitigate the growing energy demands on the United States (US) electric power grid. The …
in this trust management system to optimize the decision making process and minimize the …
in this trust management system to optimize the decision making process and minimize the …
[BOOK][B] Advances in Visual Computing: 4th International Symposium, ISVC 2008, Las Vegas, NV, USA, December 1-3, 2008, Proceedings
G Bebis - 2008 - books.google.com
… It is with great pleasure that we present the proceedings of the 4th International Symposium
on Visual Computing (ISVC 2008) in Las Vegas, Nevada. ISVC offers a common umbrella …
on Visual Computing (ISVC 2008) in Las Vegas, Nevada. ISVC offers a common umbrella …
Non-profit Organizations' Need to Address Security for Effective Government Contacting
L Rice, S Rahman�- arXiv preprint arXiv:1512.00067, 2015 - arxiv.org
… There are many ways to address the security for IT departments. The … security policies and
procedures. The IT departments of small to medium companies have to address these security …
procedures. The IT departments of small to medium companies have to address these security …
Design and analysis of a dynamically configured log-based distributed security event detection methodology
MR Grimaila, J Myers, RF Mills…�- The Journal of�…, 2012 - journals.sagepub.com
… US forces at risk because it exposes military tactics and procedures that could be exploited
by US … than 100 MB of web server content within a 24-hour period. Conceptually, this would …
by US … than 100 MB of web server content within a 24-hour period. Conceptually, this would …
[PDF][PDF] E-commerce systems security for small businesses
R Lackey�- International Journal of Network Security & Its�…, 2013 - Citeseer
… The Advanced Encryption Standard (AES) is the most current and most secure symmetric
encryption on the market. “After a lengthy process that required the cooperation of the US …
encryption on the market. “After a lengthy process that required the cooperation of the US …
Smart cards and digital security
JD Aussel�- …�Network Security: Fourth International Conference on�…, 2007 - Springer
Smart cards are portable tamper-resistant cryptographic devices that play a key role in
digital security. This paper reviews the latest use of smart cards in securing network, online …
digital security. This paper reviews the latest use of smart cards in securing network, online …
Security, privacy and trust issues in smart environments
PA Nixon, W Wagealla, C English…�- Smart Environments�…, 2004 - Wiley Online Library
… principles of security that must underpin the whole process. … Many of us, depending on our
country of residence, never give … computing [5,21–24] are encompassed in these guidelines. …
country of residence, never give … computing [5,21–24] are encompassed in these guidelines. …
First use: introducing information security in high school oracle academy courses
RAH Stalvey, C Farkas…�- …�International Conference�…, 2012 - ieeexplore.ieee.org
… computing instead of a separate topic in and of itself [24, 25]. … injection, such as the trouble
in June 2011 with Sony when SQL … the process of making students aware of database security …
in June 2011 with Sony when SQL … the process of making students aware of database security …
[BOOK][B] Digital Information Processing and Communications: International Conference, ICDIPC 2011, Ostrava, Czech Republic, July 7-9, 2011. Proceedings
… Finally, we believe that the proceedings document the best research in the studied areas.
We express our thanks to the VSB Technical University of Ostrava, Czech Republic, Springer, …
We express our thanks to the VSB Technical University of Ostrava, Czech Republic, Springer, …
Security projects for systems and networking professionals
L Deligiannidis, C Wiseman, M Yun…�- …�Trends in ICT Security, 2014 - Elsevier
… security-oriented positions are filled either by security veterans or by fresh graduates who
have little or no working security … This is the general procedure for generating the associated …
have little or no working security … This is the general procedure for generating the associated …