Sciweavers

14824 search results - page 2808 / 2965
» Security - Introduction
Sort
View
125
Voted
OSDI
2004
ACM
16 years 2 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
208
Voted
VLDB
2006
ACM
138views Database» more  VLDB 2006»
16 years 2 months ago
Succinct representation of flexible and privacy-preserving access rights
Abstract We explore the problem of portable and flexible privacy preserving access rights that permit access to a large collection of digital goods. Privacy-preserving access contr...
Marina Blanton, Mikhail J. Atallah
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 2 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
217
Voted
VLDB
2009
ACM
147views Database» more  VLDB 2009»
16 years 2 months ago
Privacy-preserving indexing of documents on the network
We address the problem of providing privacypreserving search over distributed accesscontrolled content. Indexed documents can be easily reconstructed from conventional (inverted) ...
Mayank Bawa, Rakesh Agrawal, Roberto J. Bayardo Jr...
207
Voted
SIGMOD
2009
ACM
153views Database» more  SIGMOD 2009»
16 years 2 months ago
ELMR: lightweight mobile health records
Cell phones are increasingly being used as common clients for a wide suite of distributed, database-centric healthcare applications in developing regions. This is particularly tru...
Arvind Kumar, Amey Purandare, Jay Chen, Arthur Mea...
« Prev « First page 2808 / 2965 Last » Next »