Sciweavers

109 search results - page 12 / 22
» Some Attacks on the Bit-Search Generator
Sort
View
ICITS
2009
14 years 7 months ago
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computat...
Koji Nuida, Goichiro Hanaoka
ACSAC
2004
IEEE
15 years 1 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
ISW
2007
Springer
15 years 3 months ago
Queue Management as a DoS Counter-Measure?
In this paper, we study the performance of timeout-based queue management practices in the context of flood denial-of-service (DoS) attacks on connection-oriented protocols, where...
Daniel Boteanu, José M. Fernandez, John McH...
ICSE
2004
IEEE-ACM
15 years 9 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
WINE
2005
Springer
136views Economy» more  WINE 2005»
15 years 3 months ago
Click Fraud Resistant Methods for Learning Click-Through Rates
Abstract. In pay-per-click online advertising systems like Google, Overture, or MSN, advertisers are charged for their ads only when a user clicks on the ad. While these systems ha...
Nicole Immorlica, Kamal Jain, Mohammad Mahdian, Ku...