Sciweavers

499 search results - page 2 / 100
» A Study on Latent Vulnerabilities
Sort
View
76
Voted
DIMVA
2009
14 years 10 months ago
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
Abstract. Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially m...
Jin Han, Debin Gao, Robert H. Deng
83
Voted
ICDAR
2005
IEEE
15 years 3 months ago
A Study on Vulnerability in On-line Writer Verification System
The analysis of vulnerabilities and threats in biometrics-based personal authentication systems is indispensable for the development and promotion of wide spread utilization of bi...
Yasushi Yamazaki, Akane Nakashima, Kazunobu Tasaka...
59
Voted
HICSS
2007
IEEE
122views Biometrics» more  HICSS 2007»
15 years 3 months ago
Emergent Vulnerability in Integrated Operations: A Proactive Simulation Study of Risk and Organizational Learning
Eliot Rich, Finn Olav Sveen, Ying Qian, Stefanie A...
62
Voted
COMPUTER
2000
89views more  COMPUTER 2000»
14 years 9 months ago
Windows of Vulnerability: A Case Study Analysis
William A. Arbaugh, William L. Fithen, John McHugh
USS
2010
14 years 7 months ago
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...