Sciweavers

3556 search results - page 558 / 712
» Can machine learning be secure
Sort
View
ASPLOS
2012
ACM
12 years 6 months ago
Architectural support for hypervisor-secure virtualization
Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access ...
Jakub Szefer, Ruby B. Lee
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 6 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
14 years 2 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
SPLST
2003
14 years 3 days ago
Compacting XML Documents
Abstract. Nowadays one of the most common formats for storing information is XML. The size of XML documents can be rather large, and they may contain redundant attributes which can...
Miklós Kálmán, Ferenc Havasi,...
AISADM
2007
Springer
14 years 5 months ago
Robust Agent Communities
We believe that intelligent information agents will represent their users interest in electronic marketplaces and other forums to trade, exchange, share, identify, and locate goods...
Sandip Sen, Sabyasachi Saha, Stéphane Airia...