Sciweavers

1949 search results - page 281 / 390
» Protective Interface Specifications
Sort
View
173
Voted
ACSAC
2010
IEEE
15 years 17 days ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
139
Voted
CCS
2010
ACM
15 years 17 days ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
143
Voted
ICETET
2009
IEEE
15 years 8 days ago
Development of HCNG Blended Fuel Engine with Control of NOx Emissions
With increasing concern about energy shortage and environmental protection, research on reducing exhaust emissions, reducing fuel consumption, reducing engine noise and increasing...
K. R. Patil, P. M. Khanwalkar, S. S. Thipse, K. P....
149
Voted
TIT
2010
130views Education» more  TIT 2010»
14 years 9 months ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar
126
Voted
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
14 years 9 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...