Sciweavers

37 search results - page 2 / 8
» Information gathering in adversarial systems: lines and cycl...
Sort
View
ITCC
2005
IEEE
13 years 10 months ago
Protecting On-Line Casinos against Fraudulent Player Drop-Out
Some multiplayer, on-line games rely on the collaboration of all participating players. If a player’s gamble is aborted, the rest of players cannot continue playing. This behavi...
Joaquín García, Frédér...
ESEC
1995
Springer
13 years 8 months ago
Assessing the Quality of Large, Software-Intensive Systems: A Case Study
This paper presents a case study in carrying out an audit of a large, softwareintensive system. We discuss our experience in structuring the team for obtaining maximum effectivene...
Alan W. Brown, David J. Carney, Paul C. Clements, ...
13
Voted
INFOCOM
2007
IEEE
13 years 11 months ago
Protecting Receiver-Location Privacy in Wireless Sensor Networks
—Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture the receiver physica...
Ying Jian, Shigang Chen, Zhan Zhang, Liang Zhang
IH
2004
Springer
13 years 10 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
DELTA
2008
IEEE
13 years 11 months ago
Improved Policies for Drowsy Caches in Embedded Processors
In the design of embedded systems, especially batterypowered systems, it is important to reduce energy consumption. Cache are now used not only in general-purpose processors but a...
Junpei Zushi, Gang Zeng, Hiroyuki Tomiyama, Hiroak...