157 views126 votes14 years 11 months ago ICDM 2010»
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
Abstract. In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole at...
100 views68 votes15 years 6 months ago GECCO 2003»
This paper suggests dense and switched modular primitives for a bond-graph-based GP design framework that automatically synthesizes designs for multi-domain, lumped parameter dynam...
121 views134 votes15 years 7 months ago ACSAC 2008»
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
133 views124 votes15 years 2 months ago MBUI 2004»
user interface application model dialogue model Design Design Transformation by patterns Transformation by patterns class diagram task model l use model b.-object model device mod...
Complex information systems have numerous design variables that are systematically decided upon during the design process. In high-variability systems, some of these decisions are...
129 views112 votes15 years 5 months ago AAIM 2006»
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
236 views147 votes14 years 8 months ago TCOS 2010»
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the softwar...
304 views197 votes15 years 3 months ago AGTIVE 2007»
Abstract. The DRAGOS database eases the development of graphbased applications by providing a uniform graph-oriented data storage facility. In this paper, we extend the existing da...