Sciweavers

1795 search results - page 126 / 359
» Security Models and Information Flow
Sort
View
WCE
2007
15 years 5 months ago
Motion Detection Based On Accumulative Optical Flow and Double Background Filtering
—Moving object detection is very important for video surveillance. In this paper, we present a new real time motion detection algorithm that is based on the integration of accumu...
Nan Lu, Jihong Wang, Li Yang, Q. Henry Wu
CCR
2004
87views more  CCR 2004»
15 years 3 months ago
Non-stationarity and high-order scaling in TCP flow arrivals: a methodological analysis
The last decade has been a very fruitful period in important discoveries in network traffic modeling, uncovering various scaling behaviors. Self-similarity, long-range dependence,...
Steve Uhlig
CSREASAM
2007
15 years 5 months ago
Embedded Processor Security
A preliminary model is introduced in this paper whereby data and its associated security properties are treated as a single atomic unit of information in a hardwareonly context. Se...
Brian J. d'Auriol, Tuyen Nguyen, Vo Quoc Hung, Duc...
107
Voted
IEEEARES
2006
IEEE
15 years 9 months ago
Defense trees for economic evaluation of security investments
In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
Stefano Bistarelli, Fabio Fioravanti, Pamela Peret...
CCS
2005
ACM
15 years 9 months ago
Formal security analysis of basic network-attached storage
We study formal security properties of network-attached storage (NAS) in an applied pi calculus. We model NAS as an implementation of a specification based on traditional central...
Avik Chaudhuri, Martín Abadi