Sciweavers

4511 search results - page 685 / 903
» Observation Based System Security
Sort
View
SIGCOMM
2009
ACM
15 years 10 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
15 years 10 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...
107
Voted
EUROPKI
2004
Springer
15 years 7 months ago
On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments
Abstract. A substantial number of micropayment schemes in the literature are based on distributing the cost of a digital signature over several successive micropayments (e.g. Paywo...
Josep Domingo-Ferrer
DIMVA
2006
15 years 5 months ago
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
Wireless devices that integrate the functionality of PDAs and cell phones are becoming commonplace, making different types of network services available to mobile applications. How...
Collin Mulliner, Giovanni Vigna, David Dagon, Wenk...
ICIP
1999
IEEE
16 years 5 months ago
Water-Filling: A Novel Way for Image Structural Feature Extraction
The performance of a content based image retrieval (CBIR) system is inherently constrained by the features adopted to represent the images in the database. In this paper, a new ap...
Xiang Sean Zhou, Yong Rui, Thomas S. Huang