Sciweavers

355 search results - page 16 / 71
» Security Test Generation Using Threat Trees
Sort
View
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 3 months ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore
IFIP
2007
Springer
14 years 4 months ago
Securing Current and Future Process Control Systems
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodit...
Robert K. Cunningham, Steven Cheung, Martin W. Fon...
TSE
2010
152views more  TSE 2010»
13 years 8 months ago
An Experience in Testing the Security of Real-World Electronic Voting Systems
—Voting is the process through which a democratic society determines its government. Therefore, voting systems are as important as other well-known critical systems, such as air ...
Davide Balzarotti, Greg Banks, Marco Cova, Viktori...
IPPS
2007
IEEE
14 years 4 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...
ACG
2006
Springer
14 years 3 months ago
Automatic Generation of Search Engines
A plethora of enhancements are available to be used together with the αβ search algorithm. There are so many, that their selection and implementation is a non-trivial task, even ...
Markian Hlynka, Jonathan Schaeffer