Sciweavers

499 search results - page 10 / 100
» A Study on Latent Vulnerabilities
Sort
View
ICDCS
2008
IEEE
15 years 3 months ago
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs
Null data frames are a special but important type of frames in IEEE 802.11 based Wireless Local Area Networks (e.g., 802.11 WLANs). They are widely used for power management, chan...
Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia...
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
12 years 12 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
ACSAC
2006
IEEE
15 years 3 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
ISICA
2007
Springer
15 years 3 months ago
Parameter Setting for Evolutionary Latent Class Clustering
The latent class model or multivariate multinomial mixture is a powerful model for clustering discrete data. This model is expected to be useful to represent non-homogeneous popula...
Damien Tessier, Marc Schoenauer, Christophe Bierna...
87
Voted
SPEECH
1998
118views more  SPEECH 1998»
14 years 9 months ago
Dimensionality reduction of electropalatographic data using latent variable models
We consider the problem of obtaining a reduced dimension representation of electropalatographic (EPG) data. An unsupervised learning approach based on latent variable modelling is...
Miguel Á. Carreira-Perpiñán, ...