Sciweavers

1028 search results - page 36 / 206
» Using Attack Graphs to Design Systems
Sort
View
CCS
2010
ACM
13 years 10 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...
DSN
2007
IEEE
14 years 4 months ago
Enhancing DNS Resilience against Denial of Service Attacks
The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past few years, distributed denial of service (DDoS) atta...
Vasileios Pappas, Daniel Massey, Lixia Zhang
SIGMOD
2001
ACM
166views Database» more  SIGMOD 2001»
14 years 10 months ago
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
Daniel Barbará, Julia Couto, Sushil Jajodia, Ning...
PETRA
2009
ACM
14 years 4 months ago
A mobile rehabilitation application for the remote monitoring of cardiac patients after a heart attack or a coronary bypass surg
This paper describes a personalised rehabilitation application using a smart phone (PDA) and wireless (bio) sensors. It instructs and motivates patients to follow their exercise p...
Valérie Gay, Peter Leijdekkers, Edward Bari...
CEEMAS
2007
Springer
14 years 4 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...