Sciweavers

4820 search results - page 219 / 964
» Implementing Signatures for C
Sort
View
INFOCOM
2007
IEEE
15 years 9 months ago
On the Detection of Signaling DoS Attacks on 3G Wireless Networks
— Third Generation (3G) wireless networks based on the CDMA2000 and UMTS standards are now increasingly being deployed throughout the world. Because of their complex signaling an...
Patrick P. C. Lee, Tian Bu, Thomas Y. C. Woo
VIZSEC
2004
Springer
15 years 8 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
CASES
2005
ACM
15 years 5 months ago
Hardware support for code integrity in embedded processors
Computer security becomes increasingly important with continual growth of the number of interconnected computing platforms. Moreover, as capabilities of embedded processors increa...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
BMCBI
2007
102views more  BMCBI 2007»
15 years 3 months ago
Multivariate Analysis and Visualization of Splicing Correlations in Single-Gene Transcriptomes
Background: RNA metabolism, through 'combinatorial splicing', can generate enormous structural diversity in the proteome. Alternative domains may interact, however, with...
Mark C. Emerick, Giovanni Parmigiani, William S. A...
SP
2008
IEEE
127views Security Privacy» more  SP 2008»
15 years 9 months ago
Civitas: Toward a Secure Voting System
Civitas is the first electronic voting system that is coercion-resistant, universally and voter verifiable, and suitable for remote voting. This paper describes the design and i...
Michael R. Clarkson, Stephen Chong, Andrew C. Myer...