Sciweavers

173 search results - page 24 / 35
» Classification of RFID Attacks
Sort
View
CHI
2010
ACM
14 years 2 months ago
Cleanly: trashducation urban system
Half the world’s population is expected to live in urban areas by 2020. The high human density and changes in peoples’ consumption habits result in an everincreasing amount of...
Inbal Reif, Florian Alt, Juan David Hincapié...
COMPSAC
2009
IEEE
13 years 11 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
CORR
2008
Springer
146views Education» more  CORR 2008»
13 years 7 months ago
Intrusion Detection Using Cost-Sensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not...
Aikaterini Mitrokotsa, Christos Dimitrakakis, Chri...
AUSAI
2008
Springer
13 years 9 months ago
Discriminating Against New Classes: One-class versus Multi-class Classification
Many applications require the ability to identify data that is anomalous with respect to a target group of observations, in the sense of belonging to a new, previously unseen `atta...
Kathryn Hempstalk, Eibe Frank
ICDIM
2010
IEEE
13 years 5 months ago
Detecting incompleteness in access control policies using data classification schemes
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain un...
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serg...