Sciweavers

156 search results - page 20 / 32
» Insider Threat Analysis Using Information-Centric Modeling
Sort
View
DAC
2002
ACM
14 years 8 months ago
Analysis of power consumption on switch fabrics in network routers
In this paper, we introduce a framework to estimate the power consumption on switch fabrics in network routers. We propose different modeling methodologies for node switches, inte...
Terry Tao Ye, Giovanni De Micheli, Luca Benini
DIMVA
2007
13 years 9 months ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
JSW
2008
98views more  JSW 2008»
13 years 7 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
ICPR
2006
IEEE
14 years 8 months ago
Detection of presynaptic terminals on dendritic spines in double labeling confocal images
For the analysis of learning processes and the underlying changes of the shape of excitatory synapses (spines), 3-D volume samples of selected dendritic segments are scanned by a ...
Andreas Herzog, Bernd Michaelis, Gerald Krell, Kat...
KBSE
2005
IEEE
14 years 1 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso