Sciweavers

126 search results - page 20 / 26
» Power Analysis of FPGAs: How Practical is the Attack
Sort
View
NSPW
2004
ACM
14 years 4 days ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ICSE
2007
IEEE-ACM
14 years 6 months ago
Analysis of a Redundant Architecture for Critical Infrastructure Protection
Critical infrastructures like the power grid are emerging as collection of existing separated systems of different nature which are interconnected together. Their criticality becom...
Alessandro Daidone, Andrea Bondavalli, Paulo Ver&i...
ACISP
2009
Springer
14 years 1 months ago
Towards Denial-of-Service-Resilient Key Agreement Protocols
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that ...
Douglas Stebila, Berkant Ustaoglu
CORR
1999
Springer
164views Education» more  CORR 1999»
13 years 6 months ago
Annotation graphs as a framework for multidimensional linguistic data analysis
In recent work we have presented a formal framework for linguistic annotation based on labeled acyclic digraphs. These `annotation graphs' oer a simple yet powerful method fo...
Steven Bird, Mark Liberman
DSN
2007
IEEE
14 years 1 months ago
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks
Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms that can be incorporated with ...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff