Sciweavers

252 search results - page 21 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 3 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
EVOW
2004
Springer
14 years 2 months ago
New Benchmark Instances for the QAP and the Experimental Analysis of Algorithms
Abstract. The quadratic assignment problem arises in a variety of practical settings. It is known to be among the hardest combinatorial problems for exact algorithms. Therefore, a ...
Thomas Stützle, Susana Fernandes
CSREASAM
2006
13 years 10 months ago
Acoustic Surveillance of Physically Unmodified PCs
Computer equipment produces a wide range of emanations in the visible, electromagnetic, and acoustic spectra. It is well known that electromagnetic emanations can reveal informatio...
Michael LeMay, Jack Tan
EUROSYS
2007
ACM
14 years 5 months ago
Sweeper: a lightweight end-to-end system for defending against fast worms
The vulnerabilities which plague computers cause endless grief to users. Slammer compromised millions of hosts in minutes; a hit-list worm would take under a second. Recently prop...
Joseph Tucek, James Newsome, Shan Lu, Chengdu Huan...
ACMSE
2008
ACM
13 years 10 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins