Sciweavers

74 search results - page 10 / 15
» Automated Worm Fingerprinting
Sort
View
USS
2004
13 years 8 months ago
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Niels Provos
NOMS
2008
IEEE
14 years 1 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
ICIP
1999
IEEE
14 years 8 months ago
A Model-Based Approach for Compression of Fingerprint Images
We proposea new ngerprint imagecompressionscheme based on the hybrid model of image. Our scheme uses the essential steps of a typical automated ngerprint identi cation system (AFI...
Fikret Erçal, Ilker Ersoy, Muhittin Gö...
TIM
2011
172views more  TIM 2011»
13 years 1 months ago
Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
—High-resolution automated fingerprint recognition systems (AFRSs) offer higher security because they are able to make use of level-3 features, such as pores, that are not avail...
David Zhang, Feng Liu, Qijun Zhao, Guangming Lu, N...
AAAI
2006
13 years 8 months ago
When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomalybased...
Denver Dash, Branislav Kveton, John Mark Agosta, E...