Sciweavers

30 search results - page 4 / 6
» Information-Flow Attacks Based on Limited Observations
Sort
View
ITRUST
2005
Springer
14 years 1 months ago
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, th...
Jean-Marc Seigneur, Alan Gray, Christian Damsgaard...
ICASSP
2011
IEEE
12 years 11 months ago
Cooperative sensing in cognitive networks under malicious attack
Abstract—This paper considers cooperative sensing in cognitive networks under Spectrum Sensing Data Falsification attack (SSDF) in which malicious users can intentionally send f...
Mai Abdelhakim, Lei Zhang, Jian Ren, Tongtong Li
DBSEC
2006
131views Database» more  DBSEC 2006»
13 years 9 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
MEDIAFORENSICS
2010
13 years 9 months ago
Sensor noise camera identification: countering counter-forensics
In camera identification using sensor noise, the camera that took a given image can be determined with high certainty by establishing the presence of the camera's sensor fing...
Miroslav Goljan, Jessica J. Fridrich, Mo Chen
ROBOCUP
2007
Springer
107views Robotics» more  ROBOCUP 2007»
14 years 1 months ago
Incremental Generation of Abductive Explanations for Tactical Behavior
According to the expert literature on (human) soccer, e.g., the tactical behavior of a soccer team should differ significantly with respect to the tactics and strategy of the oppo...
Thomas Wagner, Tjorben Bogon, Carsten Elfers