Sciweavers

30 search results - page 6 / 6
» Information-Flow Attacks Based on Limited Observations
Sort
View
IMC
2005
ACM
13 years 11 months ago
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event
Network “telescopes” that record packets sent to unused blocks of Internet address space have emerged as an important tool for observing Internet-scale events such as the spre...
Abhishek Kumar, Vern Paxson, Nicholas Weaver
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 5 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
CORR
2010
Springer
43views Education» more  CORR 2010»
13 years 4 months ago
Vcache: Caching Dynamic Documents
---- The traditional web caching is currently limited to static documents only. A page generated on the fly from a server side script may have different contents on different acces...
Vipul Goyal, Sugata Sanyal, Dharma P. Agrawal
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
13 years 11 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
AAAI
2008
13 years 7 months ago
ARMOR Security for Los Angeles International Airport
Security at major locations of economic or political importance is a key concern around the world, particularly given the threat of terrorism. Limited security resources prevent f...
James Pita, Manish Jain, Fernando Ordó&ntil...