Sciweavers

367 search results - page 36 / 74
» The Return of the Sensitivity Attack
Sort
View
SECON
2007
IEEE
14 years 2 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao
ICMCS
2006
IEEE
135views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Geometrically Robust Watermarking Scheme Based on Self-Recognition Watermark Pattern
Presently, almost all of the watermarking algorithms resistant to geometric attacks are dependent on the synchronization. In this paper, a geometrically robust watermarking scheme...
Hefei Ling, Zhengding Lu, Fuhao Zou, Wugang Yuan
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 1 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
AAAI
2007
13 years 10 months ago
Optimizing Anthrax Outbreak Detection Using Reinforcement Learning
The potentially catastrophic impact of a bioterrorist attack makes developing effective detection methods essential for public health. In the case of anthrax attack, a delay of ho...
Masoumeh T. Izadi, David L. Buckeridge
CHES
2010
Springer
166views Cryptology» more  CHES 2010»
13 years 8 months ago
Algebraic Side-Channel Analysis in the Presence of Errors
Measurement errors make power analysis attacks difficult to mount when only a single power trace is available: the statistical methods that make DPA attacks so successful are not a...
Yossef Oren, Mario Kirschbaum, Thomas Popp, Avisha...