Sciweavers

264 search results - page 32 / 53
» Machine Learning in Infrastructure Security
Sort
View
ICALT
2005
IEEE
15 years 5 months ago
E-Learning Teaching Material Support System for Public Vocational Training
In Vocational training, trainees with every age groups have various kinds of vocational and educational. Instructors of vocational training have to teach them according to their d...
Norikatsu Fujita, Toshihiro Hayashi, Toshinori Yam...
CCS
2011
ACM
13 years 11 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...
SIGCOMM
2009
ACM
15 years 6 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
BLISS
2009
IEEE
15 years 25 days ago
Autonomous Physical Secret Functions and Clone-Resistant Identification
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...
Wael Adi
CCS
2005
ACM
15 years 5 months ago
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Li Zhuang, Feng Zhou, J. D. Tygar