Sciweavers

5511 search results - page 69 / 1103
» Security for Network Places
Sort
View
CCS
2011
ACM
12 years 10 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
SAINT
2005
IEEE
14 years 3 months ago
Security Architecture for Control Networks using IPsec and KINK
There are many kinds of control networks which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automation...
Nobuo Okabe, Shoichi Sakane, Kazunori Miyazawa, Ke...
UAI
2004
13 years 11 months ago
Algebraic Statistics in Model Selection
We develop the necessary theory in computational algebraic geometry to place Bayesian networks into the realm of algebraic statistics. We present an algebra
Luis David Garcia
IPSN
2007
Springer
14 years 4 months ago
MiniSec: a secure sensor network communication architecture
Secure sensor network communication protocols need to provide three basic properties: data secrecy, authentication, and replay protection. Secure sensor network link layer protoco...
Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. ...
ICN
2005
Springer
14 years 3 months ago
Securing Layer 2 in Local Area Networks
Abstract. Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not bee...
Hayriye Altunbasak, Sven Krasser, Henry L. Owen, J...