Sciweavers

1795 search results - page 76 / 359
» Security Models and Information Flow
Sort
View
137
Voted
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
15 years 8 months ago
Estimating the Actual Cost of Transmission System Congestion
This paper describes a methodology that could be used by a utility to estimate the actual cost of congestion on its transmission system using limited, non-state estimator data. Th...
Thomas J. Overbye
DAC
2005
ACM
16 years 4 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
135
Voted
CSE
2009
IEEE
15 years 1 months ago
Size Matters: Variation in Personal Network Size, Personality and Effect on Information Transmission
In the last decade, there has been a massive increase in network research across both the social and physical sciences. In Physics and Mathematics, there have been extensive work o...
Yu-En Lu, Sam Roberts, Pietro Liò, Robin Du...
99
Voted
CORR
2008
Springer
91views Education» more  CORR 2008»
15 years 3 months ago
Secure Lossless Compression with Side Information
Secure data compression in the presence of side information at both a legitimate receiver and an eavesdropper is explored. A noise-free, limited rate link between the source and th...
Deniz Gündüz, Elza Erkip, H. Vincent Poo...
USS
2008
15 years 5 months ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May