Sciweavers

5119 search results - page 18 / 1024
» Security Privacy
Sort
View
94
Voted
CCS
2010
ACM
15 years 9 months ago
Oblivious enforcement of hidden information release policies
Brian Wongchaowart, Adam J. Lee
ACSAC
2009
IEEE
15 years 9 months ago
Leveraging Cellular Infrastructure to Improve Fraud Prevention
Frank S. Park, Chinmay Gangakhedkar, Patrick Trayn...
IEEEARES
2009
IEEE
15 years 9 months ago
Risk-Driven Architectural Decomposition
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
IEEEARES
2009
IEEE
15 years 9 months ago
A First Step towards Characterizing Stealthy Botnets
Justin Leonard, Shouhuai Xu, Ravi S. Sandhu