Výsledky vyhľadávania - "Security and privacy Software and application security"

  • Zobrazené výsledky 1 - 9 z 9
Upresniť hľadanie
  1. 1

    Accounting for Missing Events in Statistical Information Leakage Analysis Autor Lee, Seongmin, Minocha, Shreyas, Bohme, Marcel

    ISSN: 1558-1225
    Vydavateľské údaje: IEEE 26.04.2025
    “…The leakage of secret information via a public channel is a critical privacy flaw in software systems. The more information is leaked per observation, the less…”
    Získať plný text
    Konferenčný príspevok..
  2. 2

    Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality Autor Liao, Yifan, Xu, Ming, Lin, Yun, Teoh, Xiwen, Xie, Xiaofei, Feng, Ruitao, Liauw, Frank, Zhang, Hongyu, Dong, Jin Song

    ISSN: 2643-1572
    Vydavateľské údaje: ACM 27.10.2024
    “…Web applications are crucial infrastructures in the modern society, which have high demand of reliability and security. However, their frontend can be…”
    Získať plný text
    Konferenčný príspevok..
  3. 3

    DeMistify: Identifying On-Device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps Autor Ren, Pengcheng, Zuo, Chaoshun, Liu, Xiaofeng, Diao, Wenrui, Zhao, Qingchuan, Guo, Shanqing

    ISSN: 1558-1225
    Vydavateľské údaje: ACM 14.04.2024
    “…) to smartphones locally, which are still subject to similar vulnerabilities on the remote clouds and servers, especially when facing the model stealing attack…”
    Získať plný text
    Konferenčný príspevok..
  4. 4

    Extrapolating Coverage Rate in Greybox Fuzzing Autor Liyanage, Danushka, Lee, Seongmin, Tantithamthavorn, Chakkrit, Bohme, Marcel

    ISSN: 1558-1225
    Vydavateľské údaje: ACM 14.04.2024
    “…A fuzzer can literally run forever. However, as more resources are spent, the coverage rate continuously drops, and the utility of the fuzzer declines. To…”
    Získať plný text
    Konferenčný príspevok..
  5. 5

    Defining, enforcing and checking privacy policies in data-intensive applications Autor Guerriero, Michele, Tamburri, Damian Andrew, Di Nitto, Elisabetta

    ISBN: 9781450357159, 1450357156
    Vydavateľské údaje: New York, NY, USA ACM 28.05.2018
    “… that account for the privacy preferences of data subjects as well as for general privacy regulations…”
    Získať plný text
    Konferenčný príspevok..
  6. 6

    Collaborative Software Exploration with Multimedia Note Taking in Virtual Reality Autor Hoff, Adrian, Lungu, Mircea, Seidl, Christoph, Lanza, Michele

    ISSN: 2643-7171
    Vydavateľské údaje: ACM 15.04.2024
    “…) explore a subject system, while (2) persisting insights via free-hand diagrams, audio recordings, and in-visualization VR…”
    Získať plný text
    Konferenčný príspevok..
  7. 7

    Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Autor Parno, Bryan Jeffery

    ISBN: 1627054774, 9781627054775
    ISSN: 2374-6777
    Vydavateľské údaje: New York, NY, USA Association for Computing Machinery and Morgan & Claypool 05.06.2014
    “…From the Preface As society rushes to digitize sensitive information and services, it is imperative that we adopt adequate security protections. However, such…”
    Získať plný text
    E-kniha
  8. 8

    Intrusion detection using signatures extracted from execution profiles Autor El-Ghali, M., Masri, W.

    ISBN: 9781424437252, 1424437253
    Vydavateľské údaje: Washington, DC, USA IEEE Computer Society 19.05.2009
    “…An application based intrusion detection system is a security mechanism designed to detect malicious behavior that could compromise the security of a software…”
    Získať plný text
    Konferenčný príspevok..
  9. 9

    Trust Negotiations with Customizable Anonymity Autor Squicciarini, Anna Cinzia, Barghav-Spantzel, Abhilasha, Bertino, Elisa, Ferrari, Elena, Ray, Indrakshi

    ISBN: 0769527493, 9780769527499
    Vydavateľské údaje: Washington, DC, USA IEEE Computer Society 18.12.2006
    “… Consequently, we impose a stronger requirement: our negotiations should have the k-anonymity property -- the set of credentials submitted by a subject during a negotiation…”
    Získať plný text
    Konferenčný príspevok..