Sciweavers

45 search results - page 8 / 9
» Model-Driven Development Meets Security: An Evaluation of Cu...
Sort
View
ACSAC
2008
IEEE
13 years 11 months ago
Anti-Phishing in Offense and Defense
Many anti-phishing mechanisms currently focus on helping users verify whether a web site is genuine. However, usability studies have demonstrated that prevention-based approaches ...
Chuan Yue, Haining Wang
MSOM
2010
65views more  MSOM 2010»
13 years 2 days ago
The Optimal Composition of Influenza Vaccines Subject to Random Production Yields
The Vaccine and Related Biologic Products Advisory Committee meets at least once a year to decide the composition of the influenza vaccine in the U.S. Past evidence suggests that ...
Soo-Haeng Cho
ACSAC
2009
IEEE
14 years 4 days ago
FPValidator: Validating Type Equivalence of Function Pointers on the Fly
—Validating function pointers dynamically is very useful for intrusion detection since many runtime attacks exploit function pointer vulnerabilities. Most current solutions tackl...
Hua Wang, Yao Guo, Xiangqun Chen
BMCBI
2010
118views more  BMCBI 2010»
13 years 5 months ago
Towards realistic benchmarks for multiple alignments of non-coding sequences
Background: With the continued development of new computational tools for multiple sequence alignment, it is necessary today to develop benchmarks that aid the selection of the mo...
Jaebum Kim, Saurabh Sinha
CASES
2009
ACM
13 years 12 months ago
An accelerator-based wireless sensor network processor in 130nm CMOS
Networks of ultra-low-power nodes capable of sensing, computation, and wireless communication have applications in medicine, science, industrial automation, and security. Over the...
Mark Hempstead, Gu-Yeon Wei, David Brooks