Sciweavers

159 search results - page 8 / 32
» A Practical Solution to Corner Detection
Sort
View
RAID
2007
Springer
14 years 2 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
INFOCOM
2010
IEEE
13 years 7 months ago
Cooperative Boundary Detection for Spectrum Sensing Using Dedicated Wireless Sensor Networks
Abstract—Spectrum sensing is one of the key enabling technologies in Cognitive Radio Networks (CRNs). In CRNs, secondary users (SUs) are allowed to exploit the spectrum opportuni...
Yanyan Yang, Yunhuai Liu, Qian Zhang, Lionel M. Ni
JDCTA
2010
688views more  JDCTA 2010»
13 years 3 months ago
Hand Mouse: Real Time Hand Motion Detection System Based on Analysis of Finger Blobs
Hand detection is a fundamental step in many practical applications as gesture recognition, video surveillance, and multimodal machine interface and so on. The aim of this paper i...
Ibrahim Furkan Ince, Manuel Socarras-Garzon, Tae-C...
WETICE
2007
IEEE
14 years 2 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan
IEEECIT
2010
IEEE
13 years 7 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...