Sciweavers

786 search results - page 76 / 158
» A Software System for Secure Computer Aided Exams
Sort
View
WISEC
2010
ACM
14 years 9 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu
JMM2
2007
116views more  JMM2 2007»
14 years 11 months ago
Automatic Deformation Detection for Aircraft Engine Disk Inspection
— Computer vision algorithms are seeing increased use in industrial inspection applications. Here, we present an “Aid to Visual” system that can detect post deformations of l...
Dirk R. Padfield, Glen Brooksby, Robert Kaucic
MOBISYS
2011
ACM
14 years 2 months ago
Security versus energy tradeoffs in host-based mobile malware detection
The rapid growth of mobile malware necessitates the presence of robust malware detectors on mobile devices. However, running malware detectors on mobile devices may drain their ba...
Jeffrey Bickford, H. Andrés Lagar-Cavilla, ...
ACSAC
1998
IEEE
15 years 4 months ago
Detecting Anomalous and Unknown Intrusions Against Programs
The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed....
Anup K. Gosh, James Wanken, Frank Charron
HOTOS
2003
IEEE
15 years 5 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris