Sciweavers

14824 search results - page 2510 / 2965
» Security - Introduction
Sort
View
DATE
2008
IEEE
114views Hardware» more  DATE 2008»
15 years 11 months ago
Operating System Controlled Processor-Memory Bus Encryption
—Unencrypted data appearing on the processor– memory bus can result in security violations, e.g., allowing attackers to gather keys to financial accounts and personal data. Al...
Xi Chen, Robert P. Dick, Alok N. Choudhary
DATE
2008
IEEE
100views Hardware» more  DATE 2008»
15 years 11 months ago
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme
There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to ou...
Francis G. Wolff, Christos A. Papachristou, Swarup...
DSN
2008
IEEE
15 years 11 months ago
AGIS: Towards automatic generation of infection signatures
An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that charac...
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael ...
DSN
2008
IEEE
15 years 11 months ago
Evaluating email's feasibility for botnet command and control
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have.focused on filtering out malicious payloa...
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffi...
ETFA
2008
IEEE
15 years 11 months ago
An adaptive network architecture for home- and building environments
Fieldbus networks have significantly improved flexibility and management in classic building automation domains. However, the costs of such installations are still greatly affec...
Rolf Kistler, Stefan Knauth, Alexander Klapproth
« Prev « First page 2510 / 2965 Last » Next »