Sciweavers

2656 search results - page 35 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...
PERCOM
2011
ACM
12 years 11 months ago
Privacy preservation schemes for querying wireless sensor networks
—In this work we study the problem of query privacy in large scale sensor networks. Motivated by a novel trust model in which clients query networks owned by trusted entities but...
Tassos Dimitriou, Ahmad Sabouri
INFOCOM
2002
IEEE
14 years 19 days ago
Increase-Decrease Congestion Control for Real-time Streaming: Scalability
– Typically, NACK-based congestion control is dismissed as being not viable due to the common notion that “open-loop” congestion control is simply “difficult.” Emerging r...
Dmitri Loguinov, Hayder Radha
JCP
2007
105views more  JCP 2007»
13 years 7 months ago
Intuitive Network Applications: Learning for Personalized Converged Services Involving Social Networks
Abstract— The convergence of the wireline telecom, wireless telecom, and internet networks and the services they provide offers tremendous opportunities in services personalizati...
Robert Dinoff, Tin Kam Ho, Richard Hull, Bharat Ku...
ICDM
2010
IEEE
157views Data Mining» more  ICDM 2010»
13 years 5 months ago
Privacy Violations Using Microtargeted Ads: A Case Study
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
Aleksandra Korolova