Sciweavers

2503 search results - page 140 / 501
» Building Computer Network Attacks
Sort
View
AIS
1999
Springer
14 years 9 months ago
Life-worlds and social relations in computers
: How are social relations appearing in computers? How are social relations realised in a different kind of medium, in the hardware and software of computers? How are the organisin...
László Ropolyi
CDC
2009
IEEE
122views Control Systems» more  CDC 2009»
14 years 11 months ago
Dynamic policy-based IDS configuration
Intrusion Detection System (IDS) is an important security enforcement tool in modern networked information systems. Obtaining an optimal IDS configuration for effective detection o...
Quanyan Zhu, Tamer Basar
IJCNN
2008
IEEE
15 years 4 months ago
Band-pass Reservoir Computing
— Many applications of Reservoir Computing (and other signal processing techniques) have to deal with information processing of signals with multiple time-scales. Classical Reser...
Francis Wyffels, Benjamin Schrauwen, David Verstra...
DIGITEL
2007
IEEE
15 years 4 months ago
A Brief Survey of Distributed Computational Toys
Distributed Computational Toys are physical artifacts that function based on the coordination of more than one computing device. Often, these toys take the form of a microcontroll...
Eric Schweikardt, Mark D. Gross
NDSS
2007
IEEE
15 years 4 months ago
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser....
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, E...