Sciweavers

13224 search results - page 2436 / 2645
» Self-monitoring for Computer Users
Sort
View
PDCN
2004
13 years 9 months ago
Implementing a secure setuid program
Setuid programs are often exploited by malicious attackers to obtain unauthorized access to local systems. Setuid programs, especially owned by the root user, are granted root pri...
Takahiro Shinagawa, Kenji Kono
PDPTA
2004
13 years 9 months ago
Agent-Based Embedded Monitoring System for Ubiquitous Networks Environments
Contrary to current wireless network systems, ubiquitous network environment has quite dynamic and diversified devices which aim at best meeting the requirements of specific group ...
Hyo-Sung Kang, Jong-Mu Choi, Jai-Hoon Kim, Young-B...
IC
2003
13 years 9 months ago
Issues in Integration of Civil Engineering Services and Tools
—Civil Engineering is a discipline providing one of the most challenging environments for integration and interoperability. Great hopes are wired and wireless networking technolo...
Ziga Turk, Tomo Cerovsek, Raimar J. Scherer
SDM
2004
SIAM
141views Data Mining» more  SDM 2004»
13 years 9 months ago
Visually Mining through Cluster Hierarchies
Similarity search in database systems is becoming an increasingly important task in modern application domains such as multimedia, molecular biology, medical imaging, computer aid...
Stefan Brecheisen, Hans-Peter Kriegel, Peer Kr&oum...
SEC
2004
13 years 9 months ago
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks
Abstract--Stack smashing is still one of the most popular techniques for computer system attack. In this work, we present an antistack-smashing defense technique for Microsoft Wind...
Danny Nebenzahl, Avishai Wool
« Prev « First page 2436 / 2645 Last » Next »