Sciweavers

2281 search results - page 410 / 457
» Security Patterns and Secure Systems Design
Sort
View
112
Voted
OOPSLA
2009
Springer
15 years 10 months ago
Scalable nonblocking concurrent objects for mission critical code
The high degree of complexity and autonomy of future robotic space missions, such as Mars Science Laboratory (MSL), poses serious challenges in assuring their reliability and efïŹ...
Damian Dechev, Bjarne Stroustrup
129
Voted
ACSAC
2007
IEEE
15 years 9 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to ïŹn...
Mengjun Xie, Zhenyu Wu, Haining Wang
124
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Foreign Code Detection on the Windows/X86 Platform
As new attacks against Windows-based machines emerge almost on a daily basis, there is an increasing need to “lock down” individual users’ desktop machines in corporate comp...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
PET
2004
Springer
15 years 8 months ago
On Flow Correlation Attacks and Countermeasures in Mix Networks
In this paper, we address issues related to ïŹ‚ow correlation attacks and the corresponding countermeasures in mix networks. Mixes have been used in many anonymous communication s...
Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati,...
124
Voted
EDBTW
2010
Springer
15 years 8 months ago
ODBIS: towards a platform for on-demand business intelligence services
In recent years, Software-as-a-Service (SaaS) is gaining momentum with more and more successful adoptions. Several companies including some well known names have embraced this new...
Moez Essaidi