Sciweavers

507 search results - page 82 / 102
» Attacking DDoS at the Source
Sort
View
AVSS
2009
IEEE
15 years 4 months ago
Event Composition with Imperfect Information for Bus Surveillance
—Demand for bus surveillance is growing due to the increased threats of terrorist attack, vandalism and litigation. However, CCTV systems are traditionally used in forensic mode,...
Jianbing Ma, Weiru Liu, Paul Miller, Weiqi Yan
PDP
2009
IEEE
15 years 4 months ago
PsycoTrace: Virtual and Transparent Monitoring of a Process Self
PsycoTrace is a set of tools to protect a process P from attacks that alter P self as specified by its source code. P self is specified in terms of legal traces of system calls ...
Fabrizio Baiardi, Dario Maggiari, Daniele Sgandurr...
NTMS
2009
IEEE
15 years 4 months ago
An Adaptive Quantization Algorithm for Secret Key Generation Using Radio Channel Measurements
—New approaches that generate secret keys from radio channel characteristics have been recently proposed. The security of these schemes usually relies on the reciprocity principl...
Sana Tmar Ben Hamida, Jean-Benoît Pierrot, C...
ISCA
2008
IEEE
109views Hardware» more  ISCA 2008»
15 years 4 months ago
Flexible Hardware Acceleration for Instruction-Grain Program Monitoring
Instruction-grain program monitoring tools, which check and analyze executing programs at the granularity of individual instructions, are invaluable for quickly detecting bugs and...
Shimin Chen, Michael Kozuch, Theodoros Strigkos, B...
CVPR
2007
IEEE
15 years 4 months ago
Secure Biometric Templates from Fingerprint-Face Features
Since biometric data cannot be easily replaced or revoked, it is important that biometric templates used in biometric applications should be constructed and stored in a secure way...
Yagiz Sutcu, Qiming Li, Nasir D. Memon