Sciweavers

45 search results - page 7 / 9
» Penetration Testing: A Duet
Sort
View
IJDE
2007
105views more  IJDE 2007»
13 years 7 months ago
Mobile Phone Forensics Tool Testing: A Database Driven Approach
The Daubert process used in the admissibility of evidence contains major guidelines applied in assessing forensic procedures, two of which are testing and error rates. The Digital...
Ibrahim M. Baggili, Richard Mislan, Marcus Rogers
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 1 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis
HICSS
2002
IEEE
101views Biometrics» more  HICSS 2002»
14 years 12 days ago
Adoption of Mobile Commerce: Role of Exposure
The increasingly high penetration rate of mobile phones and the consequent exposure of subscribers to mobile technology present high hopes for the adoption of mobile commerce. Are...
Mohamed Khalifa, Sammi K. N. Cheng
PRL
2006
105views more  PRL 2006»
13 years 7 months ago
Image processing techniques for metallic object detection with millimetre-wave images
In this paper we present a system for the automatic detection and tracking of metallic objects concealed on moving people in sequences of millimetre-wave images, which can penetra...
Christopher D. Haworth, Yvan R. Petillot, Emanuele...
INFOSECCD
2006
ACM
14 years 1 months ago
Is attack better than defense?: teaching information security the right way
A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
Martin Mink, Felix C. Freiling