Sciweavers

3451 search results - page 49 / 691
» Collaborative attack modeling
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
ESORICS
2010
Springer
13 years 9 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
CIKM
2004
Springer
14 years 2 months ago
Unified filtering by combining collaborative filtering and content-based filtering via mixture model and exponential model
Collaborative filtering and content-based filtering are two types of information filtering techniques. Combining these two techniques can improve the recommendation effectiveness....
Luo Si, Rong Jin
BPM
2007
Springer
329views Business» more  BPM 2007»
14 years 3 months ago
Collaborative e-Business Process Modelling: Transforming Private EPC to Public BPMN Business Process Models
Abstract. Introducing process orientation to overcome the functionaloriented organizational structure was the main concern within enterprises during the last decade to improve proc...
Volker Hoyer, Eva Bucherer, Florian Schnabel
FSE
2005
Springer
108views Cryptology» more  FSE 2005»
14 years 2 months ago
DPA Attacks and S-Boxes
For the power consumption model called Hamming weight model, we rewrite DPA attacks in terms of correlation coefficients between two Boolean functions. We exhibit properties of S-b...
Emmanuel Prouff