Sciweavers

347 search results - page 35 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
IPPS
2003
IEEE
15 years 3 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...
TKDE
2010
158views more  TKDE 2010»
14 years 8 months ago
Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses
—With the popularity of voting systems in cyberspace, there are growing evidence that the current voting systems can be manipulated by fake votes. This problem has attracted many...
Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yan...
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
15 years 4 months ago
Toward a Query Language for Network Attack Data
The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
OPODIS
2004
14 years 11 months ago
Comparison of Failures and Attacks on Random and Scale-Free Networks
Abstract. It appeared recently that some statistical properties of complex networks like the Internet, the World Wide Web or Peer-to-Peer systems have an important influence on the...
Jean-Loup Guillaume, Matthieu Latapy, Cléme...
HICSS
2007
IEEE
183views Biometrics» more  HICSS 2007»
15 years 4 months ago
Rescuing Small and Medium-Sized Enterprises from Inefficient Information Systems - A Multi-disciplinary Method for ERP System Re
Enterprise resource planning (ERP) systems integrate companies’ multiple information systems and help adapt best practices for business processes. ERP systems are in most cases ...
Inka Vilpola, Ilkka Kouri, Kaisa Vään&au...