Sciweavers

2503 search results - page 133 / 501
» Building Computer Network Attacks
Sort
View
NIPS
2004
14 years 11 months ago
Dynamic Bayesian Networks for Brain-Computer Interfaces
We describe an approach to building brain-computer interfaces (BCI) based on graphical models for probabilistic inference and learning. We show how a dynamic Bayesian network (DBN...
Pradeep Shenoy, Rajesh P. N. Rao
SAC
2006
ACM
15 years 4 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
ACSAC
2010
IEEE
14 years 8 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
CONEXT
2008
ACM
14 years 11 months ago
Social DTN routing
Delay-tolerant network architectures exploit mobile devices carried by users to enable new networked applications. Efficiently routing information through these DTNs faces new cha...
Greg Bigwood, Tristan Henderson
SPW
2004
Springer
15 years 3 months ago
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
In this paper we describe Turtle, a peer-to-peer architecture for safe sharing of sensitive data. The truly revolutionary aspect of Turtle rests in its novel way of dealing with t...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...