Sciweavers

207 search results - page 25 / 42
» Measuring Similarity for Security Vulnerabilities
Sort
View
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 4 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
ICHIT
2009
Springer
15 years 4 months ago
Using w3af to achieve automated penetration testing by live DVD/live USB
As the popularity of the Internet continues growing, there are more and more services appeared, security measures are expected to become all the most important on the Internet. Pe...
Jiun-Kai Ke, Chung-Huang Yang, Tae-Nam Ahn
MICCAI
2007
Springer
15 years 10 months ago
Robust Computation of Mutual Information Using Spatially Adaptive Meshes
Abstract. We present a new method for the fast and robust computation of information theoretic similarity measures for alignment of multi-modality medical images. The proposed meth...
Hari Sundar, Dinggang Shen, George Biros, Chenyang...
CONCURRENCY
2008
84views more  CONCURRENCY 2008»
14 years 9 months ago
Exploring the feasibility of proactive reputations
Reputation mechanisms help peers in a peer-to-peer (P2P) system avoid unreliable or malicious peers. In application-level networks, however, short peer life-times mean reputations...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...
WISEC
2010
ACM
14 years 10 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...