Sciweavers

536 search results - page 64 / 108
» Embedding Information Security into the Organization
Sort
View
ACMIDC
2008
13 years 10 months ago
Embodying scientific concepts in the physical space of the classroom
Several simulation environments exist that create a place in which students can explore scientific phenomena. In this paper, we propose design guidelines for creating a classroom ...
Peter Malcolm, Tom Moher, Darshan Bhatt, Brian Uph...
CODES
2006
IEEE
14 years 2 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
DRM
2005
Springer
14 years 1 months ago
Watermarking and ownership problem: a revisit
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of...
Husrev T. Sencar, Nasir D. Memon
CASES
2005
ACM
13 years 10 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
KDD
2006
ACM
166views Data Mining» more  KDD 2006»
14 years 8 months ago
Anonymizing sequential releases
An organization makes a new release as new information become available, releases a tailored view for each data request, releases sensitive information and identifying information...
Ke Wang, Benjamin C. M. Fung