Sciweavers

923 search results - page 25 / 185
» Improved Slide Attacks
Sort
View
MOBIQUITOUS
2005
IEEE
14 years 4 months ago
Correlation Analysis for Alleviating Effects of Inserted Data in Wireless Sensor Networks
This paper introduces a new approach that addresses data contamination problems from attacks in unattended wireless sensor networks. We propose a sliding-window based spatio-tempo...
Sapon Tanachaiwiwat, Ahmed Helmy
ICC
2009
IEEE
155views Communications» more  ICC 2009»
13 years 9 months ago
On Hashing with Tweakable Ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
Raphael Chung-Wei Phan, Jean-Philippe Aumasson
BMCBI
2010
181views more  BMCBI 2010»
13 years 11 months ago
Intensity dependent estimation of noise in microarrays improves detection of differentially expressed genes
Background: In many microarray experiments, analysis is severely hindered by a major difficulty: the small number of samples for which expression data has been measured. When one ...
Amit Zeisel, Amnon Amir, Wolfgang J. Köstler,...
ACSAC
2004
IEEE
14 years 2 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
ICCV
2009
IEEE
1038views Computer Vision» more  ICCV 2009»
15 years 4 months ago
Combining efficient object localization and image classification
In this paper we present a combined approach for ob- ject localization and classification. Our contribution is two- fold. (a) A contextual combination of localization and clas- ...
Hedi Harzallah, Frederic Jurie, Cordelia Schmid