Sciweavers

367 search results - page 23 / 74
» The Return of the Sensitivity Attack
Sort
View
HYBRID
2009
Springer
14 years 2 months ago
Parameter Synthesis for Hybrid Systems with an Application to Simulink Models
Abstract. This paper addresses a parameter synthesis problem for nonlinear hybrid systems. Considering a set of uncertain parameters and a safety property, we give an algorithm tha...
Alexandre Donzé, Bruce H. Krogh, Akshay Raj...
USS
2010
13 years 5 months ago
AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements
Web publishers frequently integrate third-party advertisements into web pages that also contain sensitive publisher data and end-user personal data. This practice exposes sensitiv...
Mike Ter Louw, Karthik Thotta Ganesh, V. N. Venkat...
CSDA
2008
77views more  CSDA 2008»
13 years 7 months ago
Maximizing equity market sector predictability in a Bayesian time-varying parameter model
A large body of evidence has emerged in recent studies confirming that macroeconomic factors play an important role in determining investor risk premia and the ultimate path of eq...
Lorne D. Johnson, Georgios Sakoulis
WWW
2009
ACM
14 years 8 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
13 years 11 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...