Sciweavers

88 search results - page 15 / 18
» Detecting model inconsistency through operation-based model ...
Sort
View
ICSE
2007
IEEE-ACM
15 years 9 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
INFOCOM
2011
IEEE
14 years 1 months ago
Network-aware behavior clustering of Internet end hosts
Abstract—This paper explores the behavior similarity of Internet end hosts in the same network prefixes. We use bipartite graphs to model network traffic, and then construct on...
Kuai Xu, Feng Wang 0002, Lin Gu
76
Voted
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
15 years 3 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
LATINCRYPT
2010
14 years 8 months ago
Mediated Traceable Anonymous Encryption
the full version of the extended abstract which appears in Latincrypt '10 (august 8-11, 2010, Puebla, Mexico) M. Abdalla and P. Barreto Eds., Springer-Verlag, LNCS 6212, pages...
Malika Izabachène, David Pointcheval, Damie...
CIVR
2009
Springer
130views Image Analysis» more  CIVR 2009»
15 years 4 months ago
Exploring inter-concept relationship with context space for semantic video indexing
Semantic concept detectors are often individually and independently developed. Using peripherally related concepts for leveraging the power of joint detection, which is referred t...
Xiao-Yong Wei, Yu-Gang Jiang, Chong-Wah Ngo