Sciweavers

347 search results - page 64 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
MSWIM
2004
ACM
15 years 3 months ago
Modeling wireless shadow networks
In case of natural disasters or intentional attacks, telecommunication networks often get heavily damaged and current resilience schemes have proven to be insufficient for rapid r...
Filip De Turck, Aurel A. Lazar
VIROLOGY
2008
121views more  VIROLOGY 2008»
14 years 9 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
WWW
2009
ACM
15 years 10 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
ROBOCUP
1999
Springer
113views Robotics» more  ROBOCUP 1999»
15 years 2 months ago
11Monkeys Description
The major purpose of our research is to study cooperative planning for multi-agent system in time-critical environment. The RoboCup simulator league is the most interesting target ...
Shuhei Kinoshita, Yoshikazu Yamamoto
COMPSAC
2007
IEEE
15 years 1 months ago
Infrastructure Hardening: A Competitive Coevolutionary Methodology Inspired by Neo-Darwinian Arms Races
The world is increasingly dependent on critical infrastructures such as the electric power grid, water, gas, and oil transport systems, which are susceptible to cascading failures...
Travis C. Service, Daniel R. Tauritz, William M. S...