Sciweavers

1085 search results - page 124 / 217
» A Timing Attack on RC5
Sort
View
JCS
2002
115views more  JCS 2002»
14 years 9 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
IEEECIT
2010
IEEE
14 years 8 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
IFIP12
2010
14 years 8 months ago
Learning the Preferences of News Readers with SVM and Lasso Ranking
We attack the task of predicting which news-stories are more appealing to a given audience by comparing ‘most popular stories’, gathered from various online news outlets, over ...
Elena Hensinger, Ilias N. Flaounas, Nello Cristian...
P2P
2010
IEEE
124views Communications» more  P2P 2010»
14 years 8 months ago
WhatsUp: News, From, For, Through, Everyone
—WHATSUP (WUP) is a new form of electronic news. It is personalized and decentralized. Users receive news and have the ability to express their interest in it. This opinion, in t...
A. Boutet, Davide Frey, Rachid Guerraoui, Anne-Mar...
ACSAC
2010
IEEE
14 years 8 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang