Sciweavers

10435 search results - page 1793 / 2087
» Measuring system normality
Sort
View
AINA
2010
IEEE
15 years 10 months ago
GEPETO: A GEoPrivacy-Enhancing TOolkit
Abstract—A geolocalised system generally belongs to an individual and as such knowing its location reveals the location of its owner, which is a direct threat against his privacy...
Sébastien Gambs, Marc-Olivier Killijian, Mi...
CLOUD
2010
ACM
15 years 10 months ago
Hermes: clustering users in large-scale e-mail services
Hermes is an optimization engine for large-scale enterprise e-mail services. Such services could be hosted by a virtualized e-mail service provider, or by dedicated enterprise dat...
Thomas Karagiannis, Christos Gkantsidis, Dushyanth...
175
Voted
PLDI
2010
ACM
15 years 10 months ago
An analysis of the dynamic behavior of JavaScript programs
The JavaScript programming language is widely used for web programming and, increasingly, for general purpose computing. As such, improving the correctness, security and performan...
Gregor Richards, Sylvain Lebresne, Brian Burg, Jan...
143
Voted
ACSAC
2002
IEEE
15 years 10 months ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
DANCE
2002
IEEE
15 years 10 months ago
A Secure PLAN
— Active Networks, being programmable, promise greater flexibility than current networks. Programmability, however, may introduce safety and security risks. This paper describes...
Michael W. Hicks, Angelos D. Keromytis, Jonathan M...
« Prev « First page 1793 / 2087 Last » Next »