Sciweavers

6318 search results - page 17 / 1264
» Data Leakage Detection
Sort
View
CORR
2010
Springer
61views Education» more  CORR 2010»
14 years 9 months ago
Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?
Abstract-- The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the n...
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poo...
IH
2007
Springer
15 years 3 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quanti...
Luis Pérez-Freire, Fernando Pérez-Go...
CCS
2007
ACM
15 years 3 months ago
Detecting relay attacks with timing-based protocols
Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bou...
Jason Reid, Juan Manuel González Nieto, Tee...
79
Voted
SEC
2008
14 years 11 months ago
Collaborative architecture for malware detection and analysis
The constant increase of malware threats clearly shows that the present countermeasures are not sufficient especially because most actions are put in place only when infections hav...
Michele Colajanni, Daniele Gozzi, Mirco Marchetti
JVCIR
2010
180views more  JVCIR 2010»
14 years 8 months ago
Geometric attraction-driven flow for image segmentation and boundary detection
Noble forces in image segmentation based on active contours models are proposed for capturing objects in the image. Contemplating the common functionality of forces in previous ac...
Jooyoung Hahn, Chang-Ock Lee