Sciweavers

1298 search results - page 95 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
148
Voted
TKDE
2010
272views more  TKDE 2010»
15 years 1 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
119
Voted
CCS
2005
ACM
15 years 9 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
DL
1999
Springer
129views Digital Library» more  DL 1999»
15 years 7 months ago
Web Analysis Visualization Spreadsheet
In this paper, we present methods of information visualization that applies to the discovery of patterns in World-Wide Web sites. We hope to use techniques of information visualiz...
Ed Huai-hsin Chi
COMCOM
2007
95views more  COMCOM 2007»
15 years 3 months ago
Key management for long-lived sensor networks in hostile environments
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. Thes...
Michael Chorzempa, Jung Min Park, Mohamed Eltoweis...
DAWAK
2006
Springer
15 years 7 months ago
Priority-Based k-Anonymity Accomplished by Weighted Generalisation Structures
Abstract. Biobanks are gaining in importance by storing large collections of patient's clinical data (e.g. disease history, laboratory parameters, diagnosis, life style) toget...
Konrad Stark, Johann Eder, Kurt Zatloukal