Sciweavers

30 search results - page 4 / 6
» Graph Theoretic Software Watermarks: Implementation, Analysi...
Sort
View
JPDC
2006
253views more  JPDC 2006»
14 years 9 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
EIT
2008
IEEE
14 years 11 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
86
Voted
VIROLOGY
2010
162views more  VIROLOGY 2010»
14 years 7 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
ACSC
2005
IEEE
15 years 3 months ago
Integration of generic program analysis tools into a software development environment
Support for program understanding in development and maintenance tasks can be facilitated by program analysis techniques. Both control-flow and data-flow analysis can support pr...
Erica Glynn, Ian J. Hayes, Anthony MacDonald
SAC
2011
ACM
14 years 10 days ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak