Sciweavers

1737 search results - page 40 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ROBIO
2006
IEEE
153views Robotics» more  ROBIO 2006»
14 years 1 months ago
GA-based Feature Subset Selection for Myoelectric Classification
– This paper presents an ongoing investigation to select optimal subset of features from set of well-known myoelectric signals (MES) features in time and frequency domains. Four ...
Mohammadreza Asghari Oskoei, Huosheng Hu
FC
2007
Springer
136views Cryptology» more  FC 2007»
14 years 2 months ago
Usability Analysis of Secure Pairing Methods
Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Ersin Uzun, Kristiina Karvonen, N. Asokan
EUROCRYPT
2006
Springer
13 years 11 months ago
Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol
We propose simple, realistic protocols for polling that allow the responder to plausibly repudiate his response, while at the same time allow accurate statistical analysis of poll ...
Tal Moran, Moni Naor
IPPS
2005
IEEE
14 years 1 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
ACSAC
2005
IEEE
14 years 1 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop