Sciweavers

2213 search results - page 140 / 443
» Software Security
Sort
View
IOLTS
2006
IEEE
68views Hardware» more  IOLTS 2006»
15 years 9 months ago
Power Attacks on Secure Hardware Based on Early Propagation of Data
The early propagation effect found in many logic gates is a potential source of data-dependent power consumption. We show that the effect and the corresponding power dependency ca...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
135
Voted
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
15 years 5 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
106
Voted
JSW
2007
97views more  JSW 2007»
15 years 3 months ago
Using Aspect Programming to Secure Web Applications
—As the Internet users increase, the need to protect  web servers from malicious users has become a priority in  many   organizations   and   companies.   ...
Gabriel Hermosillo, Roberto Gomez, Lionel Seinturi...
136
Voted
SIGUCCS
2005
ACM
15 years 9 months ago
Imaging, security, configuration, and maintenance for the masses
Educational Partnerships and Learning Technologies (EPLT) [1] at the University of Washington maintains and supports a fleet of approximately 1,000 general-access student computin...
Brandon Koeller, Karalee Woody
ISF
2006
118views more  ISF 2006»
15 years 3 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang