Sciweavers

SLIP
2009
ACM
14 years 6 months ago
Predicting the worst-case voltage violation in a 3D power network
This paper proposes an efficient method to predict the worst case of voltage violation by multi-domain clock gating in a three-dimensional (3D) on-chip power network considering l...
Wanping Zhang, Wenjian Yu, Xiang Hu, Amirali Shaya...
SLIP
2009
ACM
14 years 6 months ago
Through-silicon-via aware interconnect prediction and optimization for 3D stacked ICs
Individual dies in 3D integrated circuits are connected using throughsilicon-vias (TSVs). TSVs not only increase manufacturing cost, but also incur silicon area, delay, and power ...
Dae Hyun Kim, Saibal Mukhopadhyay, Sung Kyu Lim
SERSCISA
2009
Springer
14 years 6 months ago
A Kademlia-Based Node Lookup System for Anonymization Networks
Node lookup mechanisms constitute an integral part of any overlay network, and hence also of anonymous communication networks. Today, most anonymizers use centralized directories, ...
Benedikt Westermann, Andriy Panchenko, Lexi Pimeni...
SERSCISA
2009
Springer
14 years 6 months ago
The Dark Side of Timed Opacity
Franck Cassez
SERSCISA
2009
Springer
14 years 6 months ago
A Deployment Value Model for Intrusion Detection Sensors
The value of an intrusion detection sensor is often associated with its data collection and analysis features. Experience tells us such sensors fall under a range of different typ...
Siraj A. Shaikh, Howard Chivers, Philip Nobles, Jo...
SERSCISA
2009
Springer
14 years 6 months ago
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense ...
Ieng-Fat Lam, Wei-Cheng Xiao, Szu-Chi Wang, Kuan-T...
SERSCISA
2009
Springer
14 years 6 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
RAID
2009
Springer
14 years 6 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
RAID
2009
Springer
14 years 6 months ago
Adaptive Anomaly Detection via Self-calibration and Dynamic Updating
The deployment and use of Anomaly Detection (AD) sensors often requires the intervention of a human expert to manually calibrate and optimize their performance. Depending on the si...
Gabriela F. Cretu-Ciocarlie, Angelos Stavrou, Mich...