Sciweavers

878 search results - page 84 / 176
» A Compiler-Based Approach to Data Security
Sort
View
120
Voted
CSFW
1998
IEEE
15 years 7 months ago
Data Level Inference Detection in Database Systems
Existing work on inference detection for database systems mainly employ functional dependencies in the database schema to detect inferences. It has been noticed that analyzing the...
Raymond W. Yip, Karl N. Levitt
ACSAC
2007
IEEE
15 years 10 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
ESORICS
2012
Springer
13 years 6 months ago
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public r...
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Ge...
115
Voted
MOC
2010
14 years 10 months ago
Error bound between monotone difference schemes and their modified equations
It is widely believed that if monotone difference schemes are applied to the linear convection equation with discontinuous initial data, then solutions of the monotone schemes are ...
Zhen-Huan Teng
128
Voted
MOC
2010
14 years 10 months ago
Approximation of stationary statistical properties of dissipative dynamical systems: Time discretization
We consider temporal approximation of stationary statistical properties of dissipative complex dynamical systems. We demonstrate that stationary statistical properties of the time...
Xiaoming Wang