Sciweavers

2403 search results - page 314 / 481
» Cyberinsurance in IT Security Management
Sort
View
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
14 years 2 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
ICC
2007
IEEE
14 years 2 months ago
Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache
— ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a solution to the ARP poisoning problem by extendin...
Zouheir Trabelsi, Wasim El-Hajj
ICDIM
2007
IEEE
14 years 2 months ago
A complexity-based method for anti-spamming
A huge diversity of approaches is in use to deal with network security and spam in particular. In this paper, we focus on a relatively new approach whose foundations rely on the w...
F. Faure, M. Lopusniac, Gilles Richard, Muhammad F...
GECCO
2007
Springer
170views Optimization» more  GECCO 2007»
14 years 2 months ago
An evolutionary keystroke authentication based on ellipsoidal hypothesis space
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
Jae-Wook Lee, Sung-Soon Choi, Byung Ro Moon
OOPSLA
2007
Springer
14 years 2 months ago
DigitalAssets discoverer: automatic identification of reusable software components
DigitalAssets Discoverer is a tool that implements a group of indicators for automatic identification of software components that can be reused in the development of new applicati...
Eduardo Machado Gonçalves, Marcilio Silva O...