Sciweavers

499 search results - page 79 / 100
» A Study on Latent Vulnerabilities
Sort
View
ACSAC
2004
IEEE
15 years 4 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
98
Voted
AFRICACRYPT
2010
Springer
15 years 3 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...
80
Voted
NSDI
2008
15 years 2 months ago
Detecting In-Flight Page Changes with Web Tripwires
While web pages sent over HTTP have no integrity guarantees, it is commonly assumed that such pages are not modified in transit. In this paper, we provide evidence of surprisingly...
Charles Reis, Steven D. Gribble, Tadayoshi Kohno, ...
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
15 years 1 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng
95
Voted
MASCOTS
2001
15 years 1 months ago
On Class-Based Isolation of UDP, Short-Lived and Long-Lived TCP Flows
The congestion control mechanisms of TCP make it vulnerable in an environment where flows with different congestionsensitivity compete for scarce resources. With the increasing am...
Selma Yilmaz, Ibrahim Matta