Sciweavers

70 search results - page 7 / 14
» Identifying Critical Components During Information Security ...
Sort
View
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
13 years 6 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
ICDCS
2005
IEEE
14 years 1 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du
IVS
2008
124views more  IVS 2008»
13 years 7 months ago
Mobile analytics for emergency response and training
During emergency response events, situational awareness is critical in effectively managing and safe-guarding civilians and in-field personnel. To better support both command cent...
SungYe Kim, Ross Maciejewski, Karl Ostmo, Edward J...
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 1 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
CIVR
2004
Springer
194views Image Analysis» more  CIVR 2004»
14 years 28 days ago
A Test-Bed for Region-Based Image Retrieval Using Multiple Segmentation Algorithms and the MPEG-7 eXperimentation Model: The Sch
The aim of the SCHEMA Network of Excellence is to bring together a critical mass of universities, research centers, industrial partners and end users, in order to design a referenc...
Vasileios Mezaris, Haralambos Doulaverakis, Raul M...