Sciweavers

269 search results - page 44 / 54
» Using model-based security analysis in component-oriented sy...
Sort
View
APWEB
2008
Springer
13 years 8 months ago
Protecting Information Sharing in Distributed Collaborative Environment
Abstract. Information sharing on distributed collaboration usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure mann...
Min Li, Hua Wang
PODC
1994
ACM
13 years 11 months ago
A Performance Evaluation of Lock-Free Synchronization Protocols
In this paper, we investigate the practical performance of lock-free techniques that provide synchronization on shared-memory multiprocessors. Our goal is to provide a technique t...
Anthony LaMarca
FGR
2000
IEEE
158views Biometrics» more  FGR 2000»
13 years 12 months ago
Dual-State Parametric Eye Tracking
Most eye trackers work well for open eyes. However, blinking is a physiological necessity for humans. Moreover, for applicationssuch as facial expression analysis and driver aware...
Ying-li Tian, Takeo Kanade, Jeffrey F. Cohn
IEEEARES
2008
IEEE
14 years 2 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin
CCS
2003
ACM
14 years 24 days ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson