Sciweavers

347 search results - page 38 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
15 years 4 months ago
Understanding the "Boundary" in Information Sharing and Integration
The definition of “boundary” in the context of multiorganizational information sharing and integration initiatives is developed in the paper. Both current literature and a cas...
Lei Zheng, Tung-Mou Yang, Theresa A. Pardo, Yuanfu...
ALGOSENSORS
2007
Springer
14 years 11 months ago
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
Ioannis Krontiris, Tassos Dimitriou, Thanassis Gia...
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
13 years 10 days ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
HICSS
2000
IEEE
129views Biometrics» more  HICSS 2000»
15 years 2 months ago
Understanding the Plant Level Costs and Benefits of ERP: Will the Ugly Duckling Always Turn into a Swan?
This paper explores the impact of Enterprise Resource Planning (ERP) systems using the individual manufacturing facility as the level of analysis. A model of ERP costs and benefit...
Thomas F. Gattiker, Dale Goodhue
CCS
2003
ACM
15 years 3 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang