Sciweavers

6164 search results - page 1089 / 1233
» Teaching Computer Security
Sort
View
188
Voted
KDD
2007
ACM
566views Data Mining» more  KDD 2007»
16 years 3 months ago
IMDS: intelligent malware detection system
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Yanfang Ye, Dingding Wang, Tao Li, Dongyi Ye
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 3 months ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
219
Voted
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
16 years 3 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
129
Voted
ICSE
2003
IEEE-ACM
16 years 3 months ago
The Grand Challenge of Trusted Components
Reusable components equipped with strict guarantees of quality can help reestablish software development on a stronger footing, by taking advantage of the scaling effect of reuse ...
Bertrand Meyer
121
Voted
EUROSYS
2008
ACM
16 years 18 days ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
« Prev « First page 1089 / 1233 Last » Next »