Sciweavers

159 search results - page 6 / 32
» A Practical Solution to Corner Detection
Sort
View
ICDIM
2010
IEEE
13 years 5 months ago
Detecting incompleteness in access control policies using data classification schemes
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain un...
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serg...
CRITIS
2007
13 years 10 months ago
Detecting DNS Amplification Attacks
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS ...
Georgios Kambourakis, Tassos Moschos, Dimitris Gen...
CONEXT
2007
ACM
13 years 10 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
CRV
2009
IEEE
183views Robotics» more  CRV 2009»
13 years 12 months ago
Bayesian Tracking of Linear Structures in Aerial Images
The interpretation of aerial images is difficult, especially for low-resolution images. Although solutions have been worked on for many years, performance of these systems is sti...
Rui Gao, Walter F. Bischof
GLOBECOM
2009
IEEE
14 years 3 months ago
Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks
Abstract—Gray hole attacks (a.k.a selective forwarding attacks) are a special case of denial of service (DoS) attack, where a misbehaving mesh router just forwards a subset of th...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali