Sciweavers

13101 search results - page 2548 / 2621
» Design and implementation of an
Sort
View
DEBS
2007
ACM
14 years 20 days ago
A taxonomy for denial of service attacks in content-based publish/subscribe systems
Denial of Service (DoS) attacks continue to affect the availability of critical systems on the Internet. The existing DoS problem is enough to merit significant research dedicated...
Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobs...
FC
2010
Springer
171views Cryptology» more  FC 2010»
14 years 19 days ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
ICCBR
2010
Springer
14 years 19 days ago
Imitating Inscrutable Enemies: Learning from Stochastic Policy Observation, Retrieval and Reuse
In this paper we study the topic of CBR systems learning from observations in which those observations can be represented as stochastic policies. We describe a general framework wh...
Kellen Gillespie, Justin Karneeb, Stephen Lee-Urba...
ICDCS
2010
IEEE
14 years 19 days ago
Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining
—Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurr...
Yangfan Zhou, Xinyu Chen, Michael R. Lyu, Jiangchu...
SOUPS
2010
ACM
14 years 19 days ago
Usably secure, low-cost authentication for mobile banking
This paper explores user authentication schemes for banking systems implemented over mobile phone networks in the developing world. We analyze an authentication scheme currently d...
Saurabh Panjwani, Edward Cutrell
« Prev « First page 2548 / 2621 Last » Next »