Sciweavers

143 search results - page 8 / 29
» Measuring, analyzing and predicting security vulnerabilities...
Sort
View
64
Voted
GLOBECOM
2008
IEEE
15 years 4 months ago
Towards Secure Link Quality Measurement in Multihop Wireless Networks
Abstract— Link quality measurement (LQM), i.e. packet reception ratio (PRR) measurement, is becoming an indispensable component in multihop wireless networks. However, in all the...
Kai Zeng, Shucheng Yu, Kui Ren, Wenjing Lou, Yanch...
ECWEB
2007
Springer
162views ECommerce» more  ECWEB 2007»
15 years 3 months ago
Impact of Relevance Measures on the Robustness and Accuracy of Collaborative Filtering
The open nature of collaborative recommender systems present a security problem. Attackers that cannot be readily distinguished from ordinary users may inject biased profiles, deg...
Jeff J. Sandvig, Bamshad Mobasher, Robin D. Burke
SOSP
2007
ACM
15 years 6 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
SIGSOFT
2008
ACM
15 years 10 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
SSWMC
2004
14 years 11 months ago
Attacks on biometric systems: a case study in fingerprints
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
Umut Uludag, Anil K. Jain