Inference attack

Results: 15



#Item
1

Inference and Attack in Bayesian Networks Sjoerd T. Timmer a John-Jules Ch. Meyer a Silja Renooij a

Add to Reading List

Source URL: www.ai.rug.nl

Language: English - Date: 2013-10-07 10:58:19
    2Electronic countermeasures / Electronics / Technology / Military communications / Denial-of-service attacks / Electronic counter-countermeasure / Military technology / Denial-of-service attack / Spread spectrum / Transmission Control Protocol / Radar jamming and deception / Draft:Energy related security attacks

    STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming Bruce DeBruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague Carnegie Mellon University Electrical and Computer Engineering {debruhl, yuseu

    Add to Reading List

    Source URL: research.owlfolio.org

    Language: English - Date: 2016-04-20 11:44:16
    3Security / Computer security / Access control / Computer access control / Role-based access control / Role hierarchy / PERMIS / Object Process Methodology / Database security / Metamodeling / Inference attack

    Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study Lars Hamann, Karsten Sohr, and Martin Gogolla University of Bremen, Computer Science Department DBremen, Germany {lhamann,sohr,gog

    Add to Reading List

    Source URL: www.db.informatik.uni-bremen.de

    Language: English - Date: 2014-12-06 08:06:31
    4

    2015 IEEE CS Security and Privacy Workshops Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations Sahel Shariati Samani∗ , Zhicong Huang† , Erman Ayday‡ , Mark Elliot∗ , Jacques Fella

    Add to Reading List

    Source URL: www.genopri.org

    Language: English - Date: 2015-05-21 15:27:03
      5

      Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2012-05-22 01:34:48
        6

        Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2012-05-22 01:34:48
          7Communications protocol / Data transmission / Protocols / Adversarial system / Social peer-to-peer processes / Sybil attack / Peer-to-peer / Adversary / Inference / Information / Data / Logic

          A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗

          Add to Reading List

          Source URL: www.eecs.harvard.edu

          Language: English - Date: 2004-05-31 19:56:00
          8World Wide Web / Web 2.0 / Keyhole Markup Language / Android software / Google Maps / Web mapping / Google / Cache / Inference attack / Software / Computing / Human–computer interaction

          University group reveals geo-inference attack threat that uses browser cache to reveal user location

          Add to Reading List

          Source URL: techxplore.com

          Language: English - Date: 2015-05-18 06:55:35
          9Measurement / Probability theory / Regression analysis / Normal distribution / Statistical hypothesis testing / Standard deviation / Pearson product-moment correlation coefficient / Errors and residuals in statistics / Variance / Statistics / Statistical inference / Data analysis

          Success through confidence: Evaluating the effectiveness of a side-channel attack. Adrian Thillard, Emmanuel Prouff, and Thomas Roche ANSSI, 51, Bd de la Tour-Maubourg, 75700 Paris 07 SP, France .f

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-05-04 07:23:23
          10Communications protocol / Data transmission / Protocols / Adversarial system / Social peer-to-peer processes / Sybil attack / Peer-to-peer / Adversary / Inference / Information / Data / Logic

          A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗

          Add to Reading List

          Source URL: www.cs.umd.edu

          Language: English - Date: 2004-06-01 10:54:35
          UPDATE