Sciweavers

37 search results - page 4 / 8
» Threat Modeling Revisited: Improving Expressiveness of Attac...
Sort
View
CIKM
2008
Springer
13 years 7 months ago
Topic models and a revisit of text-related applications
Topic models such as aspect model or LDA have been shown as a promising approach for text modeling. Unlike many previous models that restrict each document to a single topic, topi...
Viet Ha-Thuc, Padmini Srinivasan
CEAS
2008
Springer
13 years 7 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
HPCA
2009
IEEE
14 years 6 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
SOUPS
2005
ACM
13 years 11 months ago
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
Simson L. Garfinkel, Robert C. Miller
RE
2009
Springer
13 years 10 months ago
Modeling Service-Level Requirements: A Constancy Perspective
IT service requirements offer a seemingly classic Requirements Engineering (RE) problem. But, when attempting to solve it with RE methods, we are faced with difficulties. RE metho...
Gil Regev, Olivier Hayard, Donald C. Gause, Alain ...