Sciweavers

148 search results - page 26 / 30
» Ethics in Security Vulnerability Research
Sort
View
VALUETOOLS
2006
ACM
141views Hardware» more  VALUETOOLS 2006»
15 years 5 months ago
A realistic simulation of internet-scale events
Internet-scale security incidents are becoming increasingly common, and the researchers need tools to replicate and study them in a controlled setting. Current network simulators,...
Songjie Wei, Jelena Mirkovic
WOSS
2004
ACM
15 years 5 months ago
Instrumentation in software dynamic translators for self-managed systems
Self-managed software requires monitoring and code changes to an executing program. One technology that enables such self management is software dynamic translation (SDT), which a...
Naveen Kumar, Jonathan Misurda, Bruce R. Childers,...
ICDCS
2003
IEEE
15 years 5 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu
RECSYS
2009
ACM
15 years 4 months ago
Effective diverse and obfuscated attacks on model-based recommender systems
Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Zunping Cheng, Neil Hurley
CORR
2010
Springer
82views Education» more  CORR 2010»
14 years 11 months ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta