Sciweavers

617 search results - page 55 / 124
» Research Challenges for the Security of Control Systems
Sort
View
HCI
2007
13 years 10 months ago
Measuring User Experiences of Prototypical Autonomous Products in a Simulated Home Environment
Advances in sensor technology, embedded processing power, and modeling and reasoning software, have created the possibility for everyday products to sense the environment and pro-a...
Martijn H. Vastenburg, David V. Keyson, Huib de Ri...
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 7 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
MSWIM
2006
ACM
14 years 3 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
RSP
2000
IEEE
143views Control Systems» more  RSP 2000»
14 years 1 months ago
Hardware/Software Co-Design of a Java Virtual Machine
This paper discusses the initial results of research into the development of a hardware/software co-design of the Java virtual machine. The design considers a complete Java virtua...
Kenneth B. Kent, Micaela Serra
CCS
2010
ACM
14 years 1 months ago
Data protection in outsourcing scenarios: issues and directions
Data outsourcing is an emerging paradigm that allows users and companies to give their (potentially sensitive) data to external servers that then become responsible for their stor...
Pierangela Samarati, Sabrina De Capitani di Vimerc...