Sciweavers

13 search results - page 2 / 3
» An Analysis of SAFER
Sort
View
IEEEIAS
2009
IEEE
13 years 12 months ago
One-way Hash Function Construction Based on Conservative Chaotic Systems
: An algorithm for one-way hash function construction based on conservative chaotic system is proposed. The plaintext is divided into a group of message blocks by a fixed length an...
Qing-hua Zhang, Han Zhang, Zhao-hui Li
IEEEIAS
2009
IEEE
13 years 12 months ago
Network Security Situation Awareness Using Exponential and Logarithmic Analysis
: Network security situation awareness (NSSA) is a hotspot in the network security research field, and it’s the perception, comprehension, and forecast of network security situat...
Xiaobin Tan, Qin Guihong, Zhang Yong, Liang Ping
CSFW
2009
IEEE
14 years 1 days ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...
DAGSTUHL
2009
13 years 6 months ago
Using Architecture Models to Support the Generation and Operation of Component-Based Adaptive Systems
Modelling architectural information is particularly important because of the acknowledged crucial role of software architecture in raising the level of abstraction during developme...
Nelly Bencomo, Gordon S. Blair
HCI
2011
12 years 8 months ago
Online BCI Implementation of High-Frequency Phase Modulated Visual Stimuli
Abstract. Brain computer interfaces (BCI) that use the steady-statevisual-evoked-potential (SSVEP) as neural source, offer two main advantages over other types of BCIs: shorter ca...
Danhua Zhu, Gary Garcia Molina, Vojkan Mihajlovic,...