Sciweavers

441 search results - page 15 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
IEEEARES
2010
IEEE
14 years 4 months ago
Security and Usability: Analysis and Evaluation
Abstract—The differences between the fields of HumanComputer Interaction and Security (HCISec) and HumanComputer Interaction (HCI) have not been investigated very closely. Many ...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
CDC
2010
IEEE
172views Control Systems» more  CDC 2010»
13 years 1 months ago
Electrical centrality measures for electric power grid vulnerability analysis
— This paper investigates measures of centrality that are applicable to power grids. Centrality measures are used in network science to rank the relative importance of nodes and ...
Zhifang Wang, Anna Scaglione, Robert J. Thomas
IAJIT
2010
96views more  IAJIT 2010»
13 years 8 months ago
DDoS Incidents and their Impact: A Review
: The phenomenal growth and success of Internet has changed the way traditional essential services such as banking, transportation, medicine, education and defence are operated. No...
Monika Sachdeva, Gurvinder Singh, Krishan Kumar, K...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
14 years 1 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
MOBICOM
2010
ACM
13 years 10 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...