Sciweavers

280 search results - page 31 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
DBISP2P
2003
Springer
113views Database» more  DBISP2P 2003»
14 years 28 days ago
Structuring Peer-to-Peer Networks Using Interest-Based Communities
Abstract. Interest-based communities are a natural arrangement of distributed systems that prune the search space and allow for better dissemination of information to participating...
Mujtaba Khambatti, Kyung Dong Ryu, Partha Dasgupta
CCS
2011
ACM
12 years 7 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
HPCA
2009
IEEE
14 years 8 months ago
Hardware-software integrated approaches to defend against software cache-based side channel attacks
Software cache-based side channel attacks present serious threats to modern computer systems. Using caches as a side channel, these attacks are able to derive secret keys used in ...
Jingfei Kong, Onur Aciiçmez, Jean-Pierre Se...
ICPR
2006
IEEE
14 years 8 months ago
Combining Generative and Discriminative Methods for Pixel Classification with Multi-Conditional Learning
It is possible to broadly characterize two approaches to probabilistic modeling in terms of generative and discriminative methods. Provided with sufficient training data the discr...
B. Michael Kelm, Chris Pal, Andrew McCallum
CSSE
2004
IEEE
13 years 7 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...