Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

Towards Knowledge Morphing: A Triangulation Approach To Link Tacit And Explicit Knowledge, Fehmida Hussain, Syed Sibte Raza Abidi, Syed Ali Raza Aug 2005

Towards Knowledge Morphing: A Triangulation Approach To Link Tacit And Explicit Knowledge, Fehmida Hussain, Syed Sibte Raza Abidi, Syed Ali Raza

International Conference on Information and Communication Technologies

Current knowledge management systems are largely designed to deal with a single knowledge modality. Given the diversity of knowledge modalities that encompass any given topic/problem it is reasonable to demand access and use of all available knowledge, irrespective of their representation modality, to derive a knowledge-mediated solution. This calls for selecting all knowledge elements (represented in different modalities) that are relevant to the solution of the problem at hand. Thus here we pursue the specification and implementation of such a knowledge-mediated solution using a triangulation approach leading to Knowledge Morphing. In this paper we present a tacit-explicit knowledge morphing (TEKM) …


Tcp Attack Analysis On Packets Captured Using Symantec Decoy Server, Ali Bakhtiar Nizamani, Bahari Belaton Aug 2005

Tcp Attack Analysis On Packets Captured Using Symantec Decoy Server, Ali Bakhtiar Nizamani, Bahari Belaton

International Conference on Information and Communication Technologies

This paper discusses results obtained from Symantec Decoy Server (previously known as Mantrap) with an introduction to honeypots. Lance Spitzner of the Honeynet Project introduced the concept of honeypots. A honeypot is in essence a decoy server, which has no real or strategic value and is only setup to attract crackers towards it. The idea is to trap the crackers and learn cracking techniques from them. Rapid increase in unauthorized intrusions over the Internet provides a great motivation to explore honeypots at a greater depth. We will provide analysis on TCP based denial of service attack carried out on Symantec …


Knowledge Management In Public Sector Universities Of Pakistan, Eram Abbasi, Arshad Siddiqui Aug 2005

Knowledge Management In Public Sector Universities Of Pakistan, Eram Abbasi, Arshad Siddiqui

International Conference on Information and Communication Technologies

In the modern era of globalization of business, 'Information & Knowledge' is considered as the most vital resource for organizational stability. Businesses significantly depend on efficient management of 'Information' and transforming it into 'Knowledge'. Even though Information and Knowledge have been recognized as the vital resource, still the concepts of 'Information Systems' and 'Knowledge Management' are yet misunderstood. The paper firstly reviews the foundations of Information Systems to establish the basis for the conceptual understanding of 'Knowledge Management'. With these theoretical bases, then a generalized model for 'Knowledge Management' has been proposed. The discussion continues with concepts as to how …