Sciweavers

358 search results - page 68 / 72
» Protecting Secret Data from Insider Attacks
Sort
View
CCS
2004
ACM
15 years 2 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 2 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
WWW
2005
ACM
15 years 10 months ago
Finding group shilling in recommendation system
In the age of information explosion, recommendation system has been proved effective to cope with information overload in ecommerce area. However, unscrupulous producers shill the...
Xue-Feng Su, Hua-Jun Zeng, Zheng Chen
SOSP
2005
ACM
15 years 6 months ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
BIRTHDAY
2011
Springer
13 years 9 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani