Sciweavers

499 search results - page 80 / 100
» A Study on Latent Vulnerabilities
Sort
View
80
Voted
ESORICS
2010
Springer
15 years 1 months ago
On E-Vote Integrity in the Case of Malicious Voter Computers
Norway has started to implement e-voting (over the Internet, and by using voters' own computers) within the next few years. The vulnerability of voter's computers was ide...
Sven Heiberg, Helger Lipmaa, Filip van Laenen
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 1 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
111
Voted
WISEC
2010
ACM
15 years 19 days ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
ENTCS
2010
99views more  ENTCS 2010»
15 years 15 days ago
State Based Robustness Testing for Components
Component based development allows to build software upon existing components and promises to improve software reuse and reduce costs. To gain reliability of a component based sys...
Bin Lei, Zhiming Liu, Charles Morisset, Xuandong L...
102
Voted
CORR
2006
Springer
96views Education» more  CORR 2006»
15 years 14 days ago
How accurate are the time delay estimates in gravitational lensing?
We present a novel approach to estimate the time delay between light curves of multiple images in a gravitationally lensed system, based on Kernel methods in the context of machine...
Juan C. Cuevas-Tello, Peter Tino, Somak Raychaudhu...