Sciweavers

441 search results - page 23 / 89
» Vulnerabilities and Threats in Distributed Systems
Sort
View
CMS
2010
150views Communications» more  CMS 2010»
13 years 10 months ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
CCS
2008
ACM
13 years 12 months ago
Ether: malware analysis via hardware virtualization extensions
Malware has become the centerpiece of most security threats on the Internet. Malware analysis is an essential technology that extracts the runtime behavior of malware, and supplie...
Artem Dinaburg, Paul Royal, Monirul I. Sharif, Wen...
WSC
1997
13 years 11 months ago
Sea Based Logistics: Distribution Problems for Future Global Contingencies
Evolving doctrine in the U. S. Marine Corps emphasizes small, highly-mobile forces, supported from the sea rather than from large, land-based supply points. We introduce some emer...
Keebom Kang, Kevin R. Gue
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 10 months ago
Detecting Botnets Through Log Correlation
Botnets, which consist of thousands of compromised machines, can cause significant threats to other systems by launching Distributed Denial of Service (DDoS) attacks, keylogging, a...
Yousof Al-Hammadi, Uwe Aickelin
ICPR
2008
IEEE
14 years 11 months ago
Fake fingertip generation from a minutiae template
This work reports a preliminary study on the vulnerability evaluation of fingerprint verification systems to direct attacks carried out with fake fingertips created from minutiae ...
Alessandra Lumini, Davide Maltoni, Javier Galbally...