Information Security Governance: A model based on the Direct–Control Cycle Fulltext Access 5 Pages 2006
The complexity of DPA type side channel attacks and their dependency on the algorithm design Fulltext Access 5 Pages 2006
An approximate solution to lower tap changing or capacitors regulator times in reactive power control in distribution systems Fulltext Access 5 Pages 2006
Analysis of subsynchronous resonance in a multi-machine power system using series compensation Fulltext Access 5 Pages 2006
Block adaptive shifting algorithm for filtering based on the Toeplitz preconditioned conjugate gradient technique Fulltext Access 6 Pages 2006
Simplified method for protecting the power capacitor from over-voltage/over-current Fulltext Access 6 Pages 2006
Computer forensics and electronic discovery: The new management challenge Fulltext Access 6 Pages 2006
Cryptanalysis of a hybrid authentication protocol for large mobile networks Fulltext Access 6 Pages 2006
Security considerations for incremental hash functions based on pair block chaining Fulltext Access 6 Pages 2006
Buffer analysis with finite number of tunable receivers in WDM passive star networks Fulltext Access 6 Pages 2006
High-performance and wideband amplifier using bismuth-oxide-based EDF with cascade configurations Fulltext Access 6 Pages 2006
A Secure Identification and Key agreement protocol with user Anonymity (SIKA) Fulltext Access 6 Pages 2006
Novel architectural schemes for wavelength conversions in optical cross connect systems Fulltext Access 6 Pages 2006
Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem Fulltext Access 6 Pages 2006
WDM high speed chirped DPSK fiber optical system transmission modeling in presence of PMD, PDL, and CD Fulltext Access 6 Pages 2006
Design and analysis of synchronous dynamic frequency hopping code division multiple access communication system Fulltext Access 6 Pages 2006
On the security of the Yen–Guo’s domino signal encryption algorithm (DSEA) Fulltext Access 6 Pages 2006
A two-dimensional circumplex approach to the development of a hacker taxonomy Fulltext Access 6 Pages 2006
A differential approach to solve the inverse eigenvalue problem derived from a neural network Fulltext Access 6 Pages 2006
An effective method for extracting singular points in fingerprint images Fulltext Access 6 Pages 2006
A novel low mutual coupling microstrip antenna array design using defected ground structure Fulltext Access 6 Pages 2006
A comparison of scheduling mechanisms for service class differentiation in HSDPA networks Fulltext Access 6 Pages 2006
Analysis of a model of two overflow traffic components with different serving intensities Fulltext Access 6 Pages 2006
Efficient algorithm for placing a given number of base stations to cover a convex region Fulltext Access 6 Pages 2006
AMROEBA: Computational astrophysics modeling enabled by dynamic lambda switching Fulltext Access 6 Pages 2006
High-definition multimedia for multiparty low-latency interactive communication Fulltext Access 6 Pages 2006
An online preventive control approach for dynamic security of power transmission using a database system Fulltext Access 6 Pages 2006
Power quality analysis based on fuzzy estimation algorithm: Voltage flicker measurements Fulltext Access 6 Pages 2006
An efficient approach for short term load forecasting using artificial neural networks Fulltext Access 6 Pages 2006
Extraction of small-signal equivalent circuit model parameters for Si/SiGe HBT using S-parameters measurements and one geometrical information Fulltext Access 6 Pages 2006
Speed enhancement of a class of digital phase locked loops (DPLLs) by dynamic gain control technique Fulltext Access 6 Pages 2006
A regularized Newton method for one-dimensional profile inversion of a lossy cylinder Fulltext Access 6 Pages 2006
Localized routing with guaranteed delivery and a realistic physical layer in wireless sensor networks Fulltext Access 6 Pages 2006
Identifying almost identical files using context triggered piecewise hashing Fulltext Access 7 Pages 2006
Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks Fulltext Access 7 Pages 2006
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem Fulltext Access 7 Pages 2006
A cyber forensics ontology: Creating a new approach to studying cyber forensics Fulltext Access 7 Pages 2006
Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and compliance challenges Fulltext Access 7 Pages 2006
Preparing Information Security for legal and regulatory compliance (Sarbanes–Oxley and Basel II) Fulltext Access 7 Pages 2006
NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data Fulltext Access 7 Pages 2006
Application of temporal and spatial role based access control in 802.11 wireless networks Fulltext Access 7 Pages 2006