Sciweavers

272 search results - page 39 / 55
» Detecting Altered Fingerprints
Sort
View
USS
2004
15 years 3 months ago
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Niels Provos
IMC
2010
ACM
14 years 12 months ago
Demystifying service discovery: implementing an internet-wide scanner
This paper develops a high-performance, Internet-wide service discovery tool, which we call IRLscanner, whose main design objectives have been to maximize politeness at remote net...
Derek Leonard, Dmitri Loguinov
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
14 years 11 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
CCR
2011
14 years 9 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer
BMCBI
2010
136views more  BMCBI 2010»
15 years 2 months ago
An integrated Bayesian analysis of LOH and copy number data
Background: Cancer and other disorders are due to genomic lesions. SNP-microarrays are able to measure simultaneously both genotype and copy number (CN) at several Single Nucleoti...
Paola M. V. Rancoita, Marcus Hutter, Francesco Ber...