Sciweavers

1329 search results - page 220 / 266
» Phantom faces for face analysis
Sort
View
FC
2010
Springer
160views Cryptology» more  FC 2010»
14 years 29 days ago
Measuring the Perpetrators and Funders of Typosquatting
We describe a method for identifying “typosquatting”, the intentional registration of misspellings of popular website addresses. We estimate that at least 938 000 typosquatting...
Tyler Moore, Benjamin Edelman
DEBS
2009
ACM
14 years 28 days ago
MICS: an efficient content space representation model for publish/subscribe systems
One of the main challenges faced by content-based publish/subscribe systems is handling large amount of dynamic subscriptions and publications in a multidimensional content space....
Hojjat Jafarpour, Sharad Mehrotra, Nalini Venkatas...
ACSAC
2004
IEEE
14 years 24 days ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
CCS
2006
ACM
14 years 24 days ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
CP
2006
Springer
14 years 24 days ago
Stochastic Allocation and Scheduling for Conditional Task Graphs in MPSoCs
This paper describes a complete and efficient solution to the stochastic allocation and scheduling for Multi-Processor System-on-Chip (MPSoC). Given a conditional task graph charac...
Michele Lombardi, Michela Milano