Sciweavers

11603 search results - page 55 / 2321
» Securing Embedded Systems
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
14 years 13 days ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
14 years 6 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han
SAFECOMP
2009
Springer
14 years 3 months ago
Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Fa
The advanced electric power grid is a cyber-physical system comprised of physical components such as transmission lines and generators and a network of embedded systems deployed fo...
Ayman Z. Faza, Sahra Sedigh, Bruce M. McMillin