Sciweavers

Share
33 search results - page 1 / 7
» acsac 2010
Sort
View
ACSAC
2010
IEEE
8 years 10 months ago
SCOBA: source code based attestation on custom software
Liang Gu, Yao Guo, Anbang Ruan, Qingni Shen, Hong ...
ACSAC
2010
IEEE
8 years 11 months ago
Hardware assistance for trustworthy systems through 3-D integration
Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood,...
ACSAC
2010
IEEE
8 years 11 months ago
Network intrusion detection: dead or alive?
Research on network intrusion detection has produced a number of interesting results. In this paper, I look back to the NetSTAT system, which was presented at ACSAC in 1998. In ad...
Giovanni Vigna
ACSAC
2010
IEEE
8 years 11 months ago
Two methodologies for physical penetration testing using social engineering
Penetration tests on IT systems are sometimes coupled with physical penetration tests and social engineering. In physical penetration tests where social engineering is allowed, th...
Trajce Dimkov, Wolter Pieters, Pieter H. Hartel
books