Sciweavers

318 search results - page 35 / 64
» A New Perspective on Internet Security using Insurance
Sort
View
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 2 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
ITCC
2005
IEEE
14 years 2 months ago
A Mobile Commerce Framework Based on Web Services Architecture
“Mobile Internet” arguably means more than just a new technique for communication; many analysts believe that it will revolutionize the business world and innovate the way ind...
Yao-Chung Chang, Jiann-Liang Chen, Wen-Ming Tseng
IE
2007
13 years 10 months ago
Evolving images for entertainment
Images are widely used in media contexts such as web design, games and video animation. The process of creating interesting images can be enjoyable if a useful tool is involved. I...
Qinying Xu, Daryl J. D'Souza, Victor Ciesielski
CCS
2007
ACM
14 years 2 months ago
Detecting covert timing channels: an entropy-based approach
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the ...
Steven Gianvecchio, Haining Wang
WISA
2007
Springer
14 years 2 months ago
Detecting Motifs in System Call Sequences
The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pat...
William O. Wilson, Jan Feyereisl, Uwe Aickelin