Inference attack

Results: 15



#Item
1Inference and Attack in Bayesian Networks Sjoerd T. Timmer a John-Jules Ch. Meyer a  Silja Renooij a

Inference and Attack in Bayesian Networks Sjoerd T. Timmer a John-Jules Ch. Meyer a Silja Renooij a

Add to Reading List

Source URL: www.ai.rug.nl

Language: English - Date: 2013-10-07 10:58:19
    2STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming Bruce DeBruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague Carnegie Mellon University Electrical and Computer Engineering {debruhl, yuseu

    STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming Bruce DeBruhl, Yu Seung Kim, Zachary Weinberg, Patrick Tague Carnegie Mellon University Electrical and Computer Engineering {debruhl, yuseu

    Add to Reading List

    Source URL: research.owlfolio.org

    Language: English - Date: 2016-04-20 11:44:16
    3Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study Lars Hamann, Karsten Sohr, and Martin Gogolla University of Bremen, Computer Science Department DBremen, Germany {lhamann,sohr,gog

    Monitoring Database Access Constraints with an RBAC Metamodel: a Feasibility Study Lars Hamann, Karsten Sohr, and Martin Gogolla University of Bremen, Computer Science Department DBremen, Germany {lhamann,sohr,gog

    Add to Reading List

    Source URL: www.db.informatik.uni-bremen.de

    Language: English - Date: 2014-12-06 08:06:31
    42015 IEEE CS Security and Privacy Workshops  Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations Sahel Shariati Samani∗ , Zhicong Huang† , Erman Ayday‡ , Mark Elliot∗ , Jacques Fella

    2015 IEEE CS Security and Privacy Workshops Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations Sahel Shariati Samani∗ , Zhicong Huang† , Erman Ayday‡ , Mark Elliot∗ , Jacques Fella

    Add to Reading List

    Source URL: www.genopri.org

    Language: English - Date: 2015-05-21 15:27:03
      5Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security

      Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2012-05-22 01:34:48
        6Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security

        Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2012-05-22 01:34:48
          7A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗

          A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗

          Add to Reading List

          Source URL: www.eecs.harvard.edu

          Language: English - Date: 2004-05-31 19:56:00
          8World Wide Web / Web 2.0 / Keyhole Markup Language / Android software / Google Maps / Web mapping / Google / Cache / Inference attack / Software / Computing / Human–computer interaction

          University group reveals geo-inference attack threat that uses browser cache to reveal user location

          Add to Reading List

          Source URL: techxplore.com

          Language: English - Date: 2015-05-18 06:55:35
          9Success through confidence: Evaluating the effectiveness of a side-channel attack. Adrian Thillard, Emmanuel Prouff, and Thomas Roche ANSSI, 51, Bd de la Tour-Maubourg, 75700 Paris 07 SP, France .f

          Success through confidence: Evaluating the effectiveness of a side-channel attack. Adrian Thillard, Emmanuel Prouff, and Thomas Roche ANSSI, 51, Bd de la Tour-Maubourg, 75700 Paris 07 SP, France .f

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-05-04 07:23:23
          10A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗

          A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗

          Add to Reading List

          Source URL: www.cs.umd.edu

          Language: English - Date: 2004-06-01 10:54:35