Sciweavers

499 search results - page 67 / 100
» A Study on Latent Vulnerabilities
Sort
View
119
Voted
HICSS
2007
IEEE
118views Biometrics» more  HICSS 2007»
15 years 6 months ago
On the Development of an Internetwork-Centric Defense for Scanning Worms
Studies of worm outbreaks have found that the speed of worm propagation makes manual intervention ineffective. Consequently, many automated containment mechanisms have been propos...
Scott E. Coull, Boleslaw K. Szymanski
ITNG
2007
IEEE
15 years 6 months ago
Performance Analysis of Error Control Codes for Wireless Sensor Networks
In wireless sensor networks, the data transmitted from the sensor nodes are vulnerable to corruption by errors induced by noisy channels and other factors. Hence it is necessary t...
Gopinath Balakrishnan, Mei Yang, Yingtao Jiang, Yo...
108
Voted
ISVLSI
2006
IEEE
129views VLSI» more  ISVLSI 2006»
15 years 6 months ago
Dependability Analysis of Nano-scale FinFET circuits
FinFET technology has been proposed as a promising alternative for deep sub-micro bulk CMOS technology, because of its better scalability. Previous work have studied the performan...
Feng Wang 0004, Yuan Xie, Kerry Bernstein, Yan Luo
103
Voted
VALUETOOLS
2006
ACM
141views Hardware» more  VALUETOOLS 2006»
15 years 6 months ago
A realistic simulation of internet-scale events
Internet-scale security incidents are becoming increasingly common, and the researchers need tools to replicate and study them in a controlled setting. Current network simulators,...
Songjie Wei, Jelena Mirkovic
93
Voted
DATE
2005
IEEE
115views Hardware» more  DATE 2005»
15 years 6 months ago
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
— A novel power attack resistant cryptosystem is presented in this paper. Security in digital computing and communication is becoming increasingly important. Design techniques th...
Shengqi Yang, Wayne Wolf, Narayanan Vijaykrishnan,...