Sciweavers

5119 search results - page 166 / 1024
» Security Privacy
Sort
View
WPES
2003
ACM
15 years 9 months ago
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
Ì × Ô Ô Ö ÔÖ × ÒØ× Ò Û Ñ Ø Ó × Ò Ð Ò ÒÓÒÝÑÓÙ× Óѹ ÑÙÒ Ø ÓÒ ÓÒ Ø ÁÒØ ÖÒ Øº Ï × Ö Ò Û ÔÖÓØÓ ÓÐ Ø Ø ÐÐÓÛ× Ù× ØÓ ...
Matthias Bauer
ISI
2003
Springer
15 years 9 months ago
Scalable Knowledge Extraction from Legacy Sources with SEEK
Joachim Hammer, William J. O'Brien, Mark S. Schmal...
CCS
2010
ACM
15 years 8 months ago
Preventing drive-by download via inter-module communication monitoring
Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Y...
79
Voted
CCS
2009
ACM
15 years 8 months ago
A chipset level network backdoor: bypassing host-based firewall & IDS
Sherri Sparks, Shawn Embleton, Cliff Changchun Zou
CSUR
2010
124views more  CSUR 2010»
15 years 1 months ago
A taxonomy of sequential pattern mining algorithms
Nizar R. Mabroukeh, Christie I. Ezeife