Sciweavers

37217 search results - page 7273 / 7444
» or 2010
Sort
View
ACSAC
2010
IEEE
15 years 2 months ago
Multi-vendor penetration testing in the advanced metering infrastructure
- The advanced metering infrastructure (AMI) is revolutionizing electrical grids. Intelligent AMI "smart meters" report real time usage data that enables efficient energy...
Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Mia...
ACSAC
2010
IEEE
15 years 2 months ago
Breaking e-banking CAPTCHAs
Many financial institutions have deployed CAPTCHAs to protect their services (e.g., e-banking) from automated attacks. In addition to CAPTCHAs for login, CAPTCHAs are also used to...
Shujun Li, S. Amier Haider Shah, M. Asad Usman Kha...
ACSAC
2010
IEEE
15 years 2 months ago
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, trad...
An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang
ACSAC
2010
IEEE
15 years 2 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
ACSD
2010
IEEE
251views Hardware» more  ACSD 2010»
15 years 2 months ago
Modular Interpretation of Heterogeneous Modeling Diagrams into Synchronous Equations Using Static Single Assignment
Abstract--The ANR project SPaCIFY develops a domainspecific programming environment, Synoptic, to engineer embedded software for space applications. Synoptic is an Eclipse-based mo...
Jean-Pierre Talpin, Julien Ouy, Thierry Gautier, L...
« Prev « First page 7273 / 7444 Last » Next »