Sciweavers

525 search results - page 60 / 105
» The Davies-Murphy Power Attack
Sort
View
CSREASAM
2006
13 years 11 months ago
Software Vaccine Technique and Its Application in Early Virus
: The paper introduces a new anti-virus idea of Software Vaccine technique. It can apply the security technique inside the software itself. By inserting the software vaccine into t...
Xiaodong Yuan, Dajiong Yue
IJCAI
2003
13 years 11 months ago
Probabilistically Survivable MASs
Muhiagent systems (MAS) can "go down" for a large number of reasons, ranging from system malfunctions and power failures to malicious attacks. The placement of agents on...
Sarit Kraus, V. S. Subrahmanian, N. Cihan Tas
ICASSP
2010
IEEE
13 years 10 months ago
Geometric tampering estimation by means of a SIFT-based forensic analysis
In many application scenarios digital images play a basic role and often it is important to assess if their content is realistic or has been manipulated to mislead watcher’s opi...
Irene Amerini, Lamberto Ballan, Roberto Caldelli, ...
CORR
2008
Springer
99views Education» more  CORR 2008»
13 years 10 months ago
Modelling interdependencies between the electricity and information infrastructures
The aim of this paper is to provide qualitative models characterizing interdependencies related failures of two critical infrastructures: the electricity infrastructure and the ass...
Jean-Claude Laprie, Karama Kanoun, Mohamed Ka&acir...
ISI
2006
Springer
13 years 10 months ago
Content Analysis of Jihadi Extremist Groups' Videos
This paper presents an exploratory study of jihadi extremist groups' videos using content analysis and a multimedia coding tool to explore the types of videos, groups' mo...
Arab Salem, Edna Reid, Hsinchun Chen