Sciweavers

533 search results - page 3 / 107
» Control flow based obfuscation
Sort
View
RECSYS
2009
ACM
13 years 9 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
DEBS
2009
ACM
13 years 11 months ago
PrivateFlow: decentralised information flow control in event based middleware
Complex middleware frameworks are made out of interacting components which may include bugs. These frameworks are often extended to provide additional features by thirdparty exten...
Ioannis Papagiannis, Matteo Migliavacca, Peter R. ...
INFOCOM
2003
IEEE
13 years 10 months ago
A Unifying Passivity Framework for Network Flow Control
—Network flow control regulates the traffic between sources and links based on congestion, and plays a critical role in ensuring satisfactory performance. In recent studies, glob...
John T. Wen, Murat Arcak
NETWORKING
2004
13 years 6 months ago
Stabilized Edge-to-Edge Aggregate Flow Control
In this paper, we present a distributed flow control scheme which achieves weighted max-min fair bandwidth allocation among all source-destination pairs on a per-aggregate basis wi...
Hyung-Keun Ryu, Jeong-woo Cho, Song Chong
ENTCS
2008
136views more  ENTCS 2008»
13 years 4 months ago
A Virtual Machine Based Information Flow Control System for Policy Enforcement
The ability to enforce usage policies attached to data in a fine grained manner requires that the system be able to trace and control the flow of information within it. This paper...
Srijith Krishnan Nair, Patrick N. D. Simpson, Brun...