Sciweavers

3451 search results - page 487 / 691
» Collaborative attack modeling
Sort
View
ERSA
2009
109views Hardware» more  ERSA 2009»
13 years 7 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic
COMMA
2010
13 years 4 months ago
Integrating Dialectical and Accrual Modes of Argumentation
Abstract. This paper argues that accrual should be modelled in terms of reasoning about the application of preferences to sets of arguments, and shows how such reasoning can be for...
Sanjay Modgil, Trevor J. M. Bench-Capon
IFIP
2010
Springer
13 years 4 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
CORR
2008
Springer
146views Education» more  CORR 2008»
13 years 9 months ago
Intrusion Detection Using Cost-Sensitive Classification
Intrusion Detection is an invaluable part of computer networks defense. An important consideration is the fact that raising false alarms carries a significantly lower cost than not...
Aikaterini Mitrokotsa, Christos Dimitrakakis, Chri...
WSDM
2010
ACM
254views Data Mining» more  WSDM 2010»
14 years 7 months ago
Learning Influence Probabilities In Social Networks
Recently, there has been tremendous interest in the phenomenon of influence propagation in social networks. The studies in this area assume they have as input to their problems a ...
Amit Goyal 0002, Francesco Bonchi, Laks V. S. Laks...