Sciweavers

234 search results - page 36 / 47
» Data collection with self-enforcing privacy
Sort
View
IEEEARES
2010
IEEE
15 years 3 months ago
Detection of Spyware by Mining Executable Files
Spyware represents a serious threat to confidentiality since it may result in loss of control over private data for computer users. This type of software might collect the data and...
Raja Khurram Shahzad, Syed Imran Haider, Niklas La...
PERCOM
2007
ACM
15 years 9 months ago
Making Radio Frequency Identification Visible - A Watchdog Tag
To address the privacy concerns associated with RFID, previous work proposed an approach, where RFID readers do not only broadcast commands to inventory tag populations, but also ...
Christian Metzger, Christian Floerkemeier, Philipp...
GIS
2008
ACM
15 years 11 months ago
Using tomography for ubiquitous sensing
By embedding sensors in mobile devices, it is possible to exploit the ubiquitous presence of these devices to construct applications for large-scale sensing and monitoring of envi...
Stacy Patterson, Bassam Bamieh, Amr El Abbadi
ACSAC
2003
IEEE
15 years 3 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
CCS
2009
ACM
15 years 4 months ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...