Sciweavers

499 search results - page 6 / 100
» A Study on Latent Vulnerabilities
Sort
View
GLOBECOM
2006
IEEE
14 years 1 months ago
Blocking Vulnerable Paths of Wireless Sensor Networks
— In this work, we study the topology enhancement problem of wireless sensor networks. Our research focuses on reducing the path-based vulnerability. The objective is to get as m...
Shu Zhou, Min-You Wu, Wei Shu
DIMVA
2009
13 years 8 months ago
A Case Study on Asprox Infection Dynamics
Abstract. The Asprox infection weaves a complex chain of dependencies involving bots that perform SQL injections on vulnerable web servers, and visitors whose machines get compromi...
Youngsang Shin, Steven A. Myers, Minaxi Gupta
SOUPS
2009
ACM
14 years 1 months ago
Educated guess on graphical authentication schemes: vulnerabilities and countermeasures
This paper investigate security of graphical authentication tokens against educated guess attacks. Results of two user studies indicate that, if we use original photos as authenti...
Eiji Hayashi, Jason Hong, Nicolas Christin
BMCBI
2011
12 years 11 months ago
A hierarchical Bayesian network approach for linkage disequilibrium modeling and data-dimensionality reduction prior to genome-w
Background: Discovering the genetic basis of common genetic diseases in the human genome represents a public health issue. However, the dimensionality of the genetic data (up to 1...
Raphael Mourad, Christine Sinoquet, Philippe Leray
NSDI
2008
13 years 9 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen