Sciweavers

152 search results - page 14 / 31
» An Experiment On Incremental Analysis Using Robust Parsing T...
Sort
View
CCS
2009
ACM
14 years 2 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
NDSS
2009
IEEE
14 years 2 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
ICDAR
2003
IEEE
14 years 28 days ago
Video text recognition using feature compensation as category-dependent feature extraction
When recognizing multiple fonts, geometric features, such as the directional information of strokes, are generally robust against deformation but are weak against degradation. Thi...
Minoru Mori
EMMCVPR
2005
Springer
14 years 1 months ago
Brain Image Analysis Using Spherical Splines
We propose a novel technique based on spherical splines for brain surface representation and analysis. This research is strongly inspired by the fact that, for brain surfaces, it i...
Ying He 0001, Xin Li, Xianfeng Gu, Hong Qin
MEDIAFORENSICS
2010
13 years 9 months ago
A framework for theoretical analysis of content fingerprinting
The popularity of video sharing platforms such as Youtube has prompted the need for the development of efficient techniques for multimedia identification. Content fingerprinting i...
Avinash L. Varna, Wei-Hong Chuang, Min Wu