Sciweavers

1186 search results - page 151 / 238
» A New Approach to Secure Logging
Sort
View
130
Voted
ICPR
2008
IEEE
15 years 7 months ago
Multimodal biometrics management using adaptive score-level combination
This paper presents a new evolutionary approach for adaptive combination of multiple biometrics to dynamically ensure the performance for the desired level of security. The adapti...
Ajay Kumar, Vivek Kanhangad, David Zhang
82
Voted
ICDIM
2007
IEEE
15 years 7 months ago
A complexity-based method for anti-spamming
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
82
Voted
WIKIS
2005
ACM
15 years 6 months ago
SmallWiki: a meta-described collaborative content management system
Wikis are often implemented using string-based approaches to parse and generate their pages. While such approaches work well for simple wikis, they hamper the customization and ad...
Stéphane Ducasse, Lukas Renggli, Roel Wuyts
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
15 years 4 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
116
Voted
CCS
2009
ACM
15 years 7 months ago
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Prateek Mittal, Nikita Borisov