• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,423
Next 10 →

Being There -- Putting Brain, Body, and World Together Again

by Andy Clark , 1997
"... ..."
Abstract - Cited by 1067 (17 self) - Add to MetaCart
Abstract not found

Nitric Oxide and Peroxynitrite in Health and Disease

by Pál Pacher, Joseph S. Beckman, Lucas Liaudet
"... II. Nitric Oxide 317 A. Discovery of nitric oxide as a biological molecule 317 B. The selective reactivity of nitric oxide 319 C. Diffusion and signaling properties of nitric oxide 319 ..."
Abstract - Cited by 263 (5 self) - Add to MetaCart
II. Nitric Oxide 317 A. Discovery of nitric oxide as a biological molecule 317 B. The selective reactivity of nitric oxide 319 C. Diffusion and signaling properties of nitric oxide 319

Building Secure and Reliable Network Applications

by Kenneth Birman , 1996
"... ly, the remote procedure call problem, which an RPC protocol undertakes to solve, consists of emulating LPC using message passing. LPC has a number of "properties" -- a single procedure invocation results in exactly one execution of the procedure body, the result returned is reliably deliv ..."
Abstract - Cited by 232 (16 self) - Add to MetaCart
ly, the remote procedure call problem, which an RPC protocol undertakes to solve, consists of emulating LPC using message passing. LPC has a number of "properties" -- a single procedure invocation results in exactly one execution of the procedure body, the result returned is reliably delivered to the invoker, and exceptions are raised if (and only if) an error occurs. Given a completely reliable communication environment, which never loses, duplicates, or reorders messages, and given client and server processes that never fail, RPC would be trivial to solve. The sender would merely package the invocation into one or more messages, and transmit these to the server. The server would unpack the data into local variables, perform the desired operation, and send back the result (or an indication of any exception that occurred) in a reply message. The challenge, then, is created by failures. Were it not for the possibility of process and machine crashes, an RPC protocol capable of overcomi...

A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems

by Kristopher Kendall - DARPA OFF-LINE INTRUSION DETECTION EVALUATION, PROCEEDINGS DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION (DISCEX), VOL , 1999
"... The 1998 DARPA intrusion detection evaluation created the first standard corpus for evaluating computer intrusion detection systems. This corpus was designed to evaluate both false alarm rates and detection rates of intrusion detection systems using many types of both known and new attacks embedded ..."
Abstract - Cited by 154 (1 self) - Add to MetaCart
The 1998 DARPA intrusion detection evaluation created the first standard corpus for evaluating computer intrusion detection systems. This corpus was designed to evaluate both false alarm rates and detection rates of intrusion detection systems using many types of both known and new attacks embedded

Defeating UCI: Building Stealthy and Malicious Hardware

by Cynthia Sturton, Matthew Hicks, David Wagner, Samuel T. King
"... Abstract—In previous work Hicks et al. proposed a method called Unused Circuit Identification (UCI) for detecting malicious backdoors hidden in circuits at design time. The UCI algorithm essentially looks for portions of the circuit that go unused during design-time testing and flags them as potenti ..."
Abstract - Cited by 14 (0 self) - Add to MetaCart
of all circuits in that class. Our approach is simple and straight forward, yet it proves to be effective at finding circuits that can thwart UCI. We use the results of our search to construct a practical attack on an open-source processor. Our malicious backdoor allows any user-level program running

Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses

by Daniel Halperin, Daniel Halperin, Thomas S. Heydt-benjamin, Benjamin Ransford, Shane S. Clark, Will Morgan, Kevin Fu Phd, Tadayoshi Kohno Phd - In IEEE Symposium on Security and Privacy (SP , 2008
"... Part of the Computer Sciences Commons This Article is brought to you for free and open access by the Computer Science at ScholarWorks@UMass Amherst. It has been accepted for inclusion in Computer Science Department Faculty Publication Series by an authorized administrator of ScholarWorks@UMass Amher ..."
Abstract - Cited by 92 (15 self) - Add to MetaCart
Part of the Computer Sciences Commons This Article is brought to you for free and open access by the Computer Science at ScholarWorks@UMass Amherst. It has been accepted for inclusion in Computer Science Department Faculty Publication Series by an authorized administrator of ScholarWorks@UMass Amherst. For more information, please contact

Heart repair by reprogramming non-myocytes with cardiac transcription factors. Nature 485:599–604. doi

by Kunhua Song, Young-jae Nam, Xiang Luo, Xiaoxia Qi, Wei Tan, Guo N. Huang, Asha Acharya, Christopher L. Smith, Michelle D. Tallquist, Eric G. Neilson, Joseph A, Rhonda Bassel-duby, Eric N. Olson - Huang GN, Acharya A, Smith CL, Tallquist MD, Neilson EG, Hill JA, Bassel-Duby R, Olson EN , 2012
"... factors ..."
Abstract - Cited by 55 (0 self) - Add to MetaCart
Abstract not found

Low Level Implementation and Side-Channel Detection of Stealthy Hardware Trojans on

by Cédric March, Julien Francq
"... Abstract. Hardware Trojans (HTs) are an emerging threat for Inte-grated Circuits (ICs) integrity and their applications. Trying to find ef-ficient HT detection methods is necessary. But, before detect them, HTs need to be created with an efficient method and their effects need to be understood. Ther ..."
Abstract - Add to MetaCart
proposes a stealthy and reusable HT implementation method on FPGAs at the layout level adapted for the study of different HTs with the same non-infected circuit. Created for a systematic study of the effects brought by different HTs, the proposed approach allows designers to insert stealthy HTs inside

TWO CHALLENGES OF STEALTHY HYPERVISORS DETECTION: TIME CHEATING AND DATA FLUCTUATIONS

by Igor Korkin , 2015
"... Hardware virtualization technologies play a significant role in cyber security. On the one hand, these technologies enhance security levels, by designing a trusted operating system. On the other hand, these technologies can be taken up into modern malware which is rather hard to detect. None of the ..."
Abstract - Add to MetaCart
Hardware virtualization technologies play a significant role in cyber security. On the one hand, these technologies enhance security levels, by designing a trusted operating system. On the other hand, these technologies can be taken up into modern malware which is rather hard to detect. None of the existing methods is able to efficiently detect a hypervisor in the face of countermeasures such as time cheating, temporary self-uninstalling, memory hiding, etc. New hypervisor detection methods which will be described in this paper can detect a hypervisor under these countermeasures and even count several nested ones. These novel approaches rely on the new statistical analysis of time discrepancies by examination of a set of instructions, which are unconditionally intercepted by a hypervisor. Reliability was achieved through the comprehensive analysis of the collected data despite its fluctuation. These offered methods were comprehensively assessed in both Intel and AMD CPUs.

ACC/AHA/ESC 2006 guidelines for the management of patients with atrial fibrillation: a report of the American College of Cardiology/American Heart Association Task Force on Practice Guidelines and the European Society of Cardiology Committee for Practice

by Valentin Fuster, Lars E. Rydén, David S. Cannom, Harry J. Crijns, Anne B. Curtis, Kenneth A. Ellenbogen, Jonathan L. Halperin, Jean-yves Le Heuzey, G. Neal Kay, James E. Lowe, S. Bertil Olsson, Eric N. Prystowsky, Juan Luis Tamargo, Cynthia D. Adams, Jeffery L. Anderson, Elliott M. Antman, Jonathan L. Halperin, Sharon Ann Hunt, Rick Nishimura, Joseph P. Ornato, Jean-jacques Blanc, Andrzej Budaj, A. John Camm, Veronica Dean, Jaap W. Deckers, Catherine Despres, Kenneth Dickstein, John Lekakis, Keith Mcgregor, Marco Metra, Joao Morais, Ady Osterspey, Juan Luis Tamargo, José Luis Zamorano - J Am Coll
"... Subscriptions: Information about subscribing to Circulation is online at ..."
Abstract - Cited by 142 (0 self) - Add to MetaCart
Subscriptions: Information about subscribing to Circulation is online at
Next 10 →
Results 1 - 10 of 6,423
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University