Sciweavers

12183 search results - page 45 / 2437
» Computers under Attacks!
Sort
View
MMMACNS
2005
Springer
14 years 3 months ago
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...
EXPERT
2007
63views more  EXPERT 2007»
13 years 10 months ago
Computing Arguments and Attacks in Assumption-Based Argumentation
Dorian Gaertner, Francesca Toni
ICISC
2009
140views Cryptology» more  ICISC 2009»
13 years 7 months ago
Serial Model for Attack Tree Computations
Aivo Jürgenson, Jan Willemson
CONEXT
2008
ACM
13 years 11 months ago
Distributed detection of large-scale attacks in the internet
Despite the many research activities that are performed in the field of attack prevention, detection, and mitigation, largescale attacks like Distributed Denial-of-Service (DDoS) ...
Thomas Gamer
ASIACRYPT
2011
Springer
12 years 10 months ago
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
A cryptographic assumption is the (unproven) mathematical statement that a certain computational problem (e.g. factoring integers) is computationally hard. The leakage-resilience l...
Divesh Aggarwal, Ueli Maurer