Sciweavers

1795 search results - page 76 / 359
» Security Models and Information Flow
Sort
View
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
15 years 5 months ago
Estimating the Actual Cost of Transmission System Congestion
This paper describes a methodology that could be used by a utility to estimate the actual cost of congestion on its transmission system using limited, non-state estimator data. Th...
Thomas J. Overbye
DAC
2005
ACM
16 years 25 days ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
CSE
2009
IEEE
14 years 9 months ago
Size Matters: Variation in Personal Network Size, Personality and Effect on Information Transmission
In the last decade, there has been a massive increase in network research across both the social and physical sciences. In Physics and Mathematics, there have been extensive work o...
Yu-En Lu, Sam Roberts, Pietro Liò, Robin Du...
CORR
2008
Springer
91views Education» more  CORR 2008»
14 years 12 months ago
Secure Lossless Compression with Side Information
Secure data compression in the presence of side information at both a legitimate receiver and an eavesdropper is explored. A noise-free, limited rate link between the source and th...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...
USS
2008
15 years 2 months ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May