We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data structures and algorithms, to successfully reconstruc...
Abstract. The UML-based Specification Environment (USE) tool supports the syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/pos...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of som...
David Whyte, Paul C. van Oorschot, Evangelos Krana...