Sciweavers

1028 search results - page 113 / 206
» Using Attack Graphs to Design Systems
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
ICITS
2009
13 years 7 months ago
Survey: Leakage Resilience and the Bounded Retrieval Model
Abstract. This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resist...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
JSAC
2006
111views more  JSAC 2006»
13 years 9 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras
JWSR
2007
114views more  JWSR 2007»
13 years 9 months ago
Development of Distance Measures for Process Mining, Discovery and Integration
: Business processes continue to play an important role in today’s service-oriented enterprise computing systems. Mining, discovering, and integrating process-oriented services h...
Joonsoo Bae, Ling Liu, James Caverlee, Liang-Jie Z...
VR
2009
IEEE
156views Virtual Reality» more  VR 2009»
14 years 4 months ago
A Virtual Iraq System for the Treatment of Combat-Related Posttraumatic Stress Disorder
Posttraumatic Stress Disorder (PTSD) is reported to be caused by traumatic events that are outside the range of usual human experience including (but not limited to) military comb...
Shih-Ching Yeh, Brad Newman, Matt Liewer, Jarrell ...