Sciweavers

302 search results - page 56 / 61
» Using Attack Injection to Discover New Vulnerabilities
Sort
View
SAC
2011
ACM
12 years 9 months ago
Software security aspects of Java-based mobile phones
More and more functionality is provided by mobile phones today; this trend will continue over the next years. However, with the increasing functionality new risks go along. This n...
Karsten Sohr, Tanveer Mustafa, Adrian Nowak
CORR
2010
Springer
169views Education» more  CORR 2010»
13 years 7 months ago
Spiking Neurons with ASNN Based-Methods for the Neural Block Cipher
Problem statement: This paper examines Artificial Spiking Neural Network (ASNN) which inter-connects group of artificial neurons that uses a mathematical model with the aid of blo...
Saleh Ali K. Al-Omari, Putra Sumari
ICNP
2006
IEEE
14 years 1 months ago
On the Practical and Security Issues of Batch Content Distribution Via Network Coding
— File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers ...
Qiming Li, Dah-Ming Chiu, John C. S. Lui
NAR
2010
123views more  NAR 2010»
13 years 1 months ago
Xenbase: gene expression and improved integration
Xenbase (www.xenbase.org), the model organism database for Xenopus laevis and X. (Silurana) tropicalis, is the principal centralized resource of genomic, development data and comm...
Jeff B. Bowes, Kevin A. Snyder, Erik Segerdell, Ch...
INFOCOM
2006
IEEE
14 years 1 months ago
Intelligent Distribution of Intrusion Prevention Services on Programmable Routers
— The recent surge of new viruses and host attacks in the Internet and the tremendous propagation speed of selfdistributing attacks has made network security a pressing issue. To...
Andreas Hess, Hans-Florian Geerdes, Roland Wess&au...