Sciweavers

1369 search results - page 111 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ETRICS
2006
15 years 2 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
WISA
2004
Springer
15 years 4 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen
CODES
2007
IEEE
15 years 5 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
72
Voted
AUTOMATICA
2004
104views more  AUTOMATICA 2004»
14 years 11 months ago
Input-to-state stability of networked control systems
A new class of Lyapunov uniformly globally asymptotically stable (UGAS) protocols in networked control systems (NCS) is considered. It is shown that if the controller is designed ...
Dragan Nesic, Andrew R. Teel
IEEECIT
2006
IEEE
15 years 5 months ago
Improving Resiliency of Network Topology with Enhanced Evolving Strategies
— Recent studies have shown that many real networks follow the power-law distribution of node degrees. Instead of random connectivity, however, power-law connectivity suffers fro...
Soo Kim, Heejo Lee, Wan Yeon Lee