Sciweavers

1795 search results - page 138 / 359
» Security Models and Information Flow
Sort
View
150
Voted
VIS
2004
IEEE
131views Visualization» more  VIS 2004»
16 years 5 months ago
Visualization of Intricate Flow Structures for Vortex Breakdown Analysis
Vortex breakdowns and flow recirculation are essential phenomena in aeronautics where they appear as a limiting factor in the design of modern aircrafts. Because of the inherent i...
Charles D. Hansen, Christoph Garth, Eduard Deines,...
ISBI
2007
IEEE
15 years 10 months ago
Validation of Optical-Flow for Quantification of Myocardial Deformations on Simulated Rt3d Ultrasound
Quantitative analysis of cardiac motion is of great clinical interest in assessing ventricular function. Real-time 3-D (RT3D) ultrasound transducers provide valuable fourdimension...
Qi Duan, Elsa D. Angelini, Shunichi Homma, Andrew ...
ESORICS
2006
Springer
15 years 7 months ago
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...
131
Voted
CSFW
2012
IEEE
13 years 6 months ago
Measuring Information Leakage Using Generalized Gain Functions
Abstract—This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative information flow. In g-leakage, the benefit that an adversary derives f...
Mário S. Alvim, Konstantinos Chatzikokolaki...
156
Voted
CCS
2003
ACM
15 years 9 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate “stepping stones” to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves