Sciweavers

2409 search results - page 125 / 482
» Reverse engineering the Internet
Sort
View
ESSOS
2011
Springer
14 years 8 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
CIKM
2001
Springer
15 years 9 months ago
Discovering the Representative of a Search Engine
Given a large number of search engines on the Internet, it is di cult for a person to determine which search engines could serve his/her information needs. A common solution is to...
King-Lup Liu, Clement T. Yu, Weiyi Meng, Adrian Sa...
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
16 years 4 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek
HOST
2008
IEEE
15 years 11 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
FAST
2010
15 years 6 months ago
Write Endurance in Flash Drives: Measurements and Analysis
We examine the write endurance of USB flash drives using a range of approaches: chip-level measurements, reverse engineering, timing analysis, whole-device endurance testing, and ...
Simona Boboila, Peter Desnoyers