Sciweavers

580 search results - page 52 / 116
» Choosing a random peer
Sort
View
ACSAC
2010
IEEE
14 years 3 months ago
Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
Baris Coskun, Sven Dietrich, Nasir D. Memon
PODS
2003
ACM
156views Database» more  PODS 2003»
15 years 12 months ago
Limiting privacy breaches in privacy preserving data mining
There has been increasing interest in the problem of building accurate data mining models over aggregate data, while protecting privacy at the level of individual records. One app...
Alexandre V. Evfimievski, Johannes Gehrke, Ramakri...
CHES
1999
Springer
140views Cryptology» more  CHES 1999»
15 years 4 months ago
Power Analysis Attacks of Modular Exponentiation in Smartcards
Abstract. Three new types of power analysis attacks against smartcard implementations of modular exponentiation algorithms are described. The first attack requires an adversary to ...
Thomas S. Messerges, Ezzy A. Dabbish, Robert H. Sl...
WSC
2007
15 years 2 months ago
Statistical analysis of simulation output data: the practical state of the art
One of the most important but neglected aspects of a simulation study is the proper design and analysis of simulation experiments. In this tutorial we give a stateof-the-art prese...
Averill M. Law
WSC
1997
15 years 1 months ago
Sensitivity of Output Performance Measures to Input Distributions in Queueing Simulation Modeling
With modern simulation packages, the modeler can choose almost any standard statistical distribution for generating input random variables. The question arises as to how sensitive...
Donald Gross, Man Juttijudata