Sciweavers

704 search results - page 76 / 141
» A Practical Attack on KeeLoq
Sort
View
IEEECIT
2010
IEEE
14 years 10 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
ACSAC
2010
IEEE
14 years 10 months ago
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, trad...
An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang
CTW
2002
91views more  CTW 2002»
14 years 11 months ago
Can We Ever Escape from Data Overload? A Cognitive Systems Diagnosis
ive. This characterization leads to model-based abstractions and representation design techniques as potential solutions. Many of the existing approaches to coping with data overlo...
David D. Woods, Emily S. Patterson, Emilie M. Roth
CORR
2010
Springer
43views Education» more  CORR 2010»
14 years 11 months ago
Vcache: Caching Dynamic Documents
---- The traditional web caching is currently limited to static documents only. A page generated on the fly from a server side script may have different contents on different acces...
Vipul Goyal, Sugata Sanyal, Dharma P. Agrawal
IEEECIT
2010
IEEE
14 years 10 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...