Results 1 - 10
of
8,786
LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks
, 2003
"... Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node. The design of the protocol is motivated by the observ ..."
Abstract
-
Cited by 469 (22 self)
- Add to MetaCart
Protocol), a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node. The design of the protocol is motivated
A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker
"... Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises si ..."
Abstract
-
Cited by 462 (7 self)
- Add to MetaCart
significant security concerns. Therefore, it is desirable to create a secure environment to contain untrusted helper applications. We propose to reduce therisk of a security breachby restricting the program's access to the operating system. In particular, we intercept and filter dangerous system calls
Measuring the information content of stock trades
- Journal of Finance
, 1991
"... This paper suggests that the interactions of security trades and quote revisions be modeled as a vector autoregressive system. Within this framework, a trade's information effect may be meaningfully measured as the ultimate price impact of the trade innovation. Estimates for a sample of NYSE is ..."
Abstract
-
Cited by 469 (11 self)
- Add to MetaCart
This paper suggests that the interactions of security trades and quote revisions be modeled as a vector autoregressive system. Within this framework, a trade's information effect may be meaningfully measured as the ultimate price impact of the trade innovation. Estimates for a sample of NYSE
Measuring security price performance
- Journal of Financial Economics
, 1980
"... Event studies focus on the impact of particular types of firm-specific events on the prices of the affected firms ’ securities. In this paper, observed stock return data are employed to examine various methodologies which are used 111 event studies to measure security price performance. Abnormal per ..."
Abstract
-
Cited by 379 (2 self)
- Add to MetaCart
Event studies focus on the impact of particular types of firm-specific events on the prices of the affected firms ’ securities. In this paper, observed stock return data are employed to examine various methodologies which are used 111 event studies to measure security price performance. Abnormal
Security impact ratings considered harmful
"... In this paper, we question the common practice of assigning security impact ratings to OS updates. Specifically, we present evidence that ranking updates by their perceived security importance, in order to defer applying some updates, exposes systems to significant risk. We argue that OS vendors and ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
In this paper, we question the common practice of assigning security impact ratings to OS updates. Specifically, we present evidence that ranking updates by their perceived security importance, in order to defer applying some updates, exposes systems to significant risk. We argue that OS vendors
CAPTCHA: Using Hard AI Problems for Security
- IN PROCEEDINGS OF EUROCRYPT
, 2003
"... We introduce captcha, an automated test that humans can pass, but current computer programs can't pass: any program that has high success over a captcha can be used to solve an unsolved Artificial Intelligence (AI) problem. We provide several novel constructions of captchas. Since captchas ..."
Abstract
-
Cited by 331 (4 self)
- Add to MetaCart
have many applications in practical security, our approach introduces a new class of hard problems that can be exploited for security purposes. Much like research in cryptography has had a positive impact on algorithms for factoring and discrete log, we hope that the use of hard AI problems
The Economic and Security Impacts on the Aviation Industry
"... September 11, 2001 will always be considered a turning point in the history of America. Terrorists attacks in New York City and Washington D.C. with aircrafts, were proved to be a major catastrophe for American as well as world airline industry. The North American airspace was completely shut down f ..."
Abstract
- Add to MetaCart
since that time. It’s really hard for airlines to balance their finance and get profits at this moment. The aim of this article is to explore the economic impact of September 11 from two aspects: airline and airports. An insight into the decline in air passenger demand due to September 11 is provided
On the semantic patterns of passwords and their security impact. NDSS
, 2014
"... Abstract—We present the first framework for segmentation, semantic classification, and semantic generalization of passwords and a model that captures the semantic essence of password samples. Researchers have only touched the surface of patterns in password creation, with the semantics of passwords ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
remaining largely unexplored, leaving a gap in our understanding of their characteristics and, consequently, their security. In this paper, we begin to fill this gap by employing Natural Language Processing techniques to extract and leverage understanding of semantic patterns in passwords. The results
Soil Carbon Sequestration impacts on Global Climate Change and Food Security.
- Science,
, 2004
"... ..."
Results 1 - 10
of
8,786