Sciweavers

2106 search results - page 313 / 422
» Specifying C concepts
Sort
View
SAC
2009
ACM
14 years 3 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
WWW
2009
ACM
14 years 3 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...
ICDAR
2009
IEEE
14 years 3 months ago
Impact of Alphabet Knowledge on Online Writer Identification
Character prototype approaches for writer identification produces a consistent set of templates that are used to model the handwriting styles of writers, thereby allowing high acc...
Guo Xian Tan, Christian Viard-Gaudin, Alex C. Kot
PROVSEC
2009
Springer
14 years 3 months ago
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
SIGCOMM
2009
ACM
14 years 3 months ago
A local knowledge base for service oriented access network selection
Service oriented access in a multi-application, multi-access network environment poses interesting research challenges. One of these challenges refers to cross-layer interoperabil...
Carolina Fortuna, Mihael Mohorcic