Sciweavers

639 search results - page 95 / 128
» About Norms and Causes
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
14 years 11 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
ICSE
2010
IEEE-ACM
14 years 10 months ago
Fourth International Workshop on Software Clones (IWSC)
Software clones are identical or similar pieces of code. They are often the result of copy–and–paste activities as ad-hoc code reuse by programmers. Software clones research i...
Katsuro Inoue, Stanislaw Jarzabek, James R. Cordy,...
TCOM
2010
62views more  TCOM 2010»
14 years 10 months ago
Downstream power backoff in CO/RT-deployed xDSL networks
Abstract—To gradually expand their networks, operators deploy new xDSL technologies from remote terminals (RT’s) closer to the customer. However, since xDSL lines deployed from...
Jan Vangorp, Marc Moonen, Mamoun Guenach, Michael ...
ESORICS
2010
Springer
14 years 9 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
GLOBECOM
2010
IEEE
14 years 9 months ago
Performance Evaluation of Network Mobility Handover over Future Aeronautical Data Link
The aviation community is currently working on the standardization of data communication systems for the future air traffic management. In this context, the ICAO and EUROCONTROL ar...
Serkan Ayaz, Felix Hoffmann, Christoph Sommer, Rei...