Sciweavers

264 search results - page 32 / 53
» Machine Learning in Infrastructure Security
Sort
View
ICALT
2005
IEEE
14 years 29 days ago
E-Learning Teaching Material Support System for Public Vocational Training
In Vocational training, trainees with every age groups have various kinds of vocational and educational. Instructors of vocational training have to teach them according to their d...
Norikatsu Fujita, Toshihiro Hayashi, Toshinori Yam...
CCS
2011
ACM
12 years 7 months ago
AmazonIA: when elasticity snaps back
Cloud Computing is an emerging technology promising new business opportunities and easy deployment of web services. Much has been written about the risks and benefits of cloud co...
Sven Bugiel, Stefan Nürnberger, Thomas Pö...
SIGCOMM
2009
ACM
14 years 1 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
BLISS
2009
IEEE
13 years 8 months ago
Autonomous Physical Secret Functions and Clone-Resistant Identification
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...
Wael Adi
CCS
2005
ACM
14 years 27 days ago
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Li Zhuang, Feng Zhou, J. D. Tygar