Sciweavers

231 search results - page 32 / 47
» A Host-Based Approach to Network Attack Chaining Analysis
Sort
View
CCS
2009
ACM
15 years 4 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
ECBS
2007
IEEE
155views Hardware» more  ECBS 2007»
15 years 3 months ago
Integrating Security Modeling into Embedded System Design
There is an ever increasing concern about security threats as embedded systems are moving towards networked applications. Model based approaches have proven to be effective techni...
Matthew Eby, Jan Werner, Gabor Karsai, Ákos...
MIDDLEWARE
2007
Springer
15 years 3 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 4 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
75
Voted
IFIP
2010
Springer
15 years 2 months ago
Laban Movement Analysis towards Behavior Patterns
This work presents a study about the use of Laban Movement Analysis (LMA) as a robust tool to describe human basic behavior patterns, to be applied in human-machine interaction. LM...
Luís Santos, Jorge Dias