Sciweavers

279 search results - page 45 / 56
» 20 Years of ECM
Sort
View
CCS
2007
ACM
14 years 2 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
CCS
2007
ACM
14 years 2 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
EUROCRYPT
2007
Springer
14 years 2 months ago
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
Protocols proven secure within the universal composability (UC) framework satisfy strong and desirable security properties. Unfortunately, it is known that within the “plain” m...
Jonathan Katz
ETS
2006
IEEE
118views Hardware» more  ETS 2006»
14 years 2 months ago
Living with Failure: Lessons from Nature?
- The resources available on a chip continue to grow, following Moore's Law. However, the major process by which the benefits of Moore's Law accrue, which is the continui...
Steve Furber
SEW
2006
IEEE
14 years 2 months ago
Goal-Driven Software Development
Established software development processes focus on delivering software within time and budget according to a set of requirements. However, practical experiences show that neither...
Ingo Schnabel, Markus Pizka