Sciweavers

3451 search results - page 474 / 691
» Collaborative attack modeling
Sort
View
PERCOM
2008
ACM
14 years 9 months ago
A Novel Utility and Game-Theoretic Based Security Mechanism for Mobile P2P Systems
Research on security in Peer-to-Peer (P2P) systems is dominated by reputation-based solutions. These solutions propagate opinions about other peers in order to help identify the b...
Brent Lagesse, Mohan Kumar
PAKDD
2009
ACM
115views Data Mining» more  PAKDD 2009»
14 years 4 months ago
Data Mining for Intrusion Detection: From Outliers to True Intrusions
Data mining for intrusion detection can be divided into several sub-topics, among which unsupervised clustering has controversial properties. Unsupervised clustering for intrusion...
Goverdhan Singh, Florent Masseglia, Céline ...
CSIE
2009
IEEE
14 years 4 months ago
An Improved Algorithm of Digital Watermarking Based on Wavelet Transform
In this paper, a digital image watermarking technique based on Discrete Wavelet Transform (DWT) will be proposed. This scheme is designed utilizing principles deriving from the hu...
Jianhong Sun, Junsheng Li, Zhiyong Li
DSN
2009
IEEE
14 years 4 months ago
A QoS-aware fault tolerant middleware for dependable service composition
Based on the framework of service-oriented architecture (SOA), complex distributed systems can be dynamically and automatically composed by integrating distributed Web services pr...
Zibin Zheng, Michael R. Lyu
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
14 years 4 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...