Sciweavers

1663 search results - page 115 / 333
» Computer Security in the Real World
Sort
View
118
Voted
KES
2004
Springer
15 years 8 months ago
Chance Discovery with Emergence of Future Scenarios
A "chance" is an event or a situation significant for making a decision in a complex environment. Since we organized a session of Chance Discovery in KES 2000, the basic...
Yukio Ohsawa
EUROSYS
2010
ACM
16 years 17 days ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
SIN
2010
ACM
15 years 1 months ago
Analysis of privacy in online social networks of runet
In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situation...
Slava Kisilevich, Florian Mansmann
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 3 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
123
Voted
SOSP
2005
ACM
16 years 11 days ago
THINC: a virtual display architecture for thin-client computing
Rapid improvements in network bandwidth, cost, and ubiquity combined with the security hazards and high total cost of ownership of personal computers have created a growing market...
Ricardo A. Baratto, Leonard N. Kim, Jason Nieh