Sciweavers

4511 search results - page 614 / 903
» Observation Based System Security
Sort
View
IH
2005
Springer
15 years 9 months ago
Compulsion Resistant Anonymous Communications
We study the effect compulsion attacks, through which an adversary can request a decryption or key from an honest node, have on the security of mix based anonymous communication s...
George Danezis, Jolyon Clulow
ISI
2005
Springer
15 years 9 months ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...
ISI
2005
Springer
15 years 9 months ago
Discovering Identity Problems: A Case Study
Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies...
Alan Gang Wang, Homa Atabakhsh, Tim Petersen, Hsin...
NOSSDAV
2005
Springer
15 years 9 months ago
Mitigating information exposure to cheaters in real-time strategy games
Cheating in on-line games is a prevalent problem for both game makers and players. The popular real-time strategy game genre is especially vulnerable to cheats, as it is frequentl...
Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanj...
ICARIS
2004
Springer
15 years 9 months ago
Online Negative Databases
The benefits of negative detection for obscuring information are explored in the context of Artificial Immune Systems (AIS). AIS based on string matching have the potential for a...
Fernando Esponda, Elena S. Ackley, Stephanie Forre...