Sciweavers

499 search results - page 2 / 100
» A Study on Latent Vulnerabilities
Sort
View
95
Voted
DIMVA
2009
15 years 1 months ago
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
Abstract. Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially m...
Jin Han, Debin Gao, Robert H. Deng
ICDAR
2005
IEEE
15 years 5 months ago
A Study on Vulnerability in On-line Writer Verification System
The analysis of vulnerabilities and threats in biometrics-based personal authentication systems is indispensable for the development and promotion of wide spread utilization of bi...
Yasushi Yamazaki, Akane Nakashima, Kazunobu Tasaka...
81
Voted
HICSS
2007
IEEE
122views Biometrics» more  HICSS 2007»
15 years 6 months ago
Emergent Vulnerability in Integrated Operations: A Proactive Simulation Study of Risk and Organizational Learning
Eliot Rich, Finn Olav Sveen, Ying Qian, Stefanie A...
COMPUTER
2000
89views more  COMPUTER 2000»
15 years 2 days ago
Windows of Vulnerability: A Case Study Analysis
William A. Arbaugh, William L. Fithen, John McHugh
USS
2010
14 years 10 months ago
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...