Sciweavers

122 search results - page 19 / 25
» Security Metrics and Security Investment Models
Sort
View
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
14 years 17 days ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
14 years 1 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
ICIAR
2004
Springer
14 years 1 months ago
Three-Dimensional Face Recognition: A Fishersurface Approach
Previous work has shown that principal component analysis (PCA) of three-dimensional face models can be used to perform recognition to a high degree of accuracy. However, experimen...
Thomas Heseltine, Nick Pears, Jim Austin
CSMR
2006
IEEE
14 years 2 months ago
A Framework for Software Architecture Refactoring using Model Transformations and Semantic Annotations
Software-intensive systems evolve continuously under the pressure of new and changing requirements, generally leading to an increase in overall system complexity. In this respect,...
Igor Ivkovic, Kostas Kontogiannis
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 7 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...