Sciweavers

418 search results - page 23 / 84
» Security Associations in Personal Networks: A Comparative An...
Sort
View
WISEC
2010
ACM
14 years 21 days ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
ISI
2004
Springer
14 years 1 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 6 months ago
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of leg...
Kenton Born, David Gustafson
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
13 years 11 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
TREC
2008
13 years 9 months ago
Research on Enterprise Track of TREC 2008
This is the third year that we (ICT-CAS team) participated in the Enterprise Track of TREC. The track of this year includes two tasks, being document search task and expert search...
Huawei Shen, Lei Wang, Wenjing Bi, Yue Liu, Xueqi ...