Sciweavers

3451 search results - page 141 / 691
» Collaborative attack modeling
Sort
View
114
Voted
HICSS
2009
IEEE
124views Biometrics» more  HICSS 2009»
15 years 9 months ago
Case Studies of an Insider Framework
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
COLCOM
2007
IEEE
15 years 9 months ago
Multicasting in groupware?
— While multicast has been studied extensively in many domains such as content streaming and file sharing, there is little research applying it to synchronous collaborations invo...
Sasa Junuzovic, Prasun Dewan
95
Voted
CCS
2009
ACM
16 years 3 months ago
Conditional proxy re-encryption secure against chosen-ciphertext attack
In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice's public key into encryptions under Bob's public key w...
Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang ...
100
Voted
ICMCS
2007
IEEE
130views Multimedia» more  ICMCS 2007»
15 years 8 months ago
Mining Information of Attack-Defense Status from Soccer Video Based on Scene Analysis
Video Content is always huge by itself with abundant information. Extracting explicit semantic information has been extensively investigated such as object detection, structure an...
Shuqiang Jiang, Qingming Huang, Wen Gao
132
Voted
COMCOM
2008
120views more  COMCOM 2008»
15 years 2 months ago
Game theoretic models for detecting network intrusions
In this paper, we study using game theory the problem of detecting intrusions in wired infrastructure networks. Detection is accomplished by sampling a subset of the transmitted p...
Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad De...