Sciweavers

237 search results - page 9 / 48
» Adaptive Systems Require Adaptive Support--When Tools Attack...
Sort
View
LATINCRYPT
2010
13 years 6 months ago
Generic Attacks on Misty Schemes
Abstract. Misty schemes are classic cryptographic schemes used to construct pseudo-random permutations from 2n bits to 2n bits by using d pseudo-random permutations from n bits to ...
Valérie Nachef, Jacques Patarin, Joana Treg...
AUSDM
2007
Springer
110views Data Mining» more  AUSDM 2007»
14 years 1 months ago
Adaptive Spike Detection for Resilient Data Stream Mining
Automated adversarial detection systems can fail when under attack by adversaries. As part of a resilient data stream mining system to reduce the possibility of such failure, adap...
Clifton Phua, Kate Smith-Miles, Vincent C. S. Lee,...
WORDS
2005
IEEE
14 years 1 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
WETICE
2008
IEEE
14 years 2 months ago
An Architecture for an Adaptive and Collaborative Learning Management System in Aviation Security
The importance of aviation security has increased dramatically in recent years. Frequently changing regulations and the need to adapt quickly to new and emerging threats are chall...
Yi Guo, Adrian Schwaninger, Harald Gall
GLOBECOM
2006
IEEE
14 years 1 months ago
Wavelet-based Detection of DoS Attacks
— Automated detection of anomalies in network traffic is an important and challenging task. In this work we propose an automated system to detect volume-based anomalies in netwo...
Alberto Dainotti, Antonio Pescapè, Giorgio ...