Sciweavers

302 search results - page 10 / 61
» Using Attack Injection to Discover New Vulnerabilities
Sort
View
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
12 years 3 months ago
Effort Estimates for Vulnerability Discovery Projects
Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This paper analyzes estimates...
Teodor Sommestad, Hannes Holm, Mathias Ekstedt
DSD
2009
IEEE
152views Hardware» more  DSD 2009»
13 years 11 months ago
ARROW - A Generic Hardware Fault Injection Tool for NoCs
Todays NoCs are reaching a level where it is getting very hard to ensure 100% of functionality. Consequently, fault tolerance has become an important aspect in todays design techn...
Michael Birner, Thomas Handl
SIGMOD
2006
ACM
96views Database» more  SIGMOD 2006»
14 years 8 months ago
Injecting utility into anonymized datasets
Limiting disclosure in data publishing requires a careful balance between privacy and utility. Information about individuals must not be revealed, but a dataset should still be us...
Daniel Kifer, Johannes Gehrke
USS
2010
13 years 5 months ago
Searching the Searchers with SearchAudit
Search engines not only assist normal users, but also provide information that hackers and other malicious entities can exploit in their nefarious activities. With carefully craft...
John P. John, Fang Yu, Yinglian Xie, Martín...
ECWEB
2007
Springer
162views ECommerce» more  ECWEB 2007»
14 years 2 months ago
Impact of Relevance Measures on the Robustness and Accuracy of Collaborative Filtering
The open nature of collaborative recommender systems present a security problem. Attackers that cannot be readily distinguished from ordinary users may inject biased profiles, deg...
Jeff J. Sandvig, Bamshad Mobasher, Robin D. Burke