Sciweavers

103 search results - page 18 / 21
» Anomaly Detection through Registration
Sort
View
IEEEIAS
2008
IEEE
14 years 1 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
ISMIS
2005
Springer
14 years 25 days ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
NCA
2008
IEEE
14 years 1 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck
IWDW
2004
Springer
14 years 21 days ago
Fingerprinting Curves
This paper presents a new method for robust data hiding in curves and highlights potential applications including digital fingerprinting of map document for trace and track purpos...
Hongmei Gou, Min Wu
IEEEHPCS
2010
13 years 5 months ago
Texture feature representation in dynamic environments
This paper presents a novel approach to detect and formulate time varying changes in texture content on a sequence of images registered from a scene by using Gabor wavelets repres...
Kyeong Deok Woo, Sung Gook Kim, Sung Wook Baik