Sciweavers

1369 search results - page 80 / 274
» A Practical Implementation of the Timing Attack
Sort
View
DSN
2004
IEEE
15 years 2 months ago
Dependable Adaptive Real-Time Applications in Wormhole-based Systems
This paper describes and discusses the work carried on in the context of the CORTEX project, for the development of adaptive real-time applications in wormhole based systems. The ...
Pedro Martins, Paulo Jorge Paiva de Sousa, Antonio...
DSN
2007
IEEE
15 years 3 months ago
A Real-Time Network Traffic Profiling System
This paper presents the design and implementation of a real-time behavior profiling system for high-speed Internet links. The profiling system uses flow-level information from con...
Kuai Xu, Feng Wang 0002, Supratik Bhattacharyya, Z...
ICISC
2004
169views Cryptology» more  ICISC 2004»
15 years 13 days ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
DATE
2005
IEEE
107views Hardware» more  DATE 2005»
15 years 4 months ago
On Statistical Timing Analysis with Inter- and Intra-Die Variations
In this paper, we highlight a fast, effective and practical statistical approach that deals with inter and intra-die variations in VLSI chips. Our methodology is applied to a numb...
Hratch Mangassarian, Mohab Anis
IH
2007
Springer
15 years 5 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...