Sciweavers

1875 search results - page 341 / 375
» Automatic Network Protocol Analysis
Sort
View
DSN
2005
IEEE
14 years 2 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
IMC
2005
ACM
14 years 2 months ago
Predicting Short-Transfer Latency from TCP Arcana: A Trace-based Validation
In some contexts it may be useful to predict the latency for short TCP transfers. For example, a Web server could automatically tailor its content depending on the network path to...
Martin F. Arlitt, Balachander Krishnamurthy, Jeffr...
BIOADIT
2004
Springer
14 years 2 months ago
Explaining Low-Level Brightness-Contrast Illusions Using Disinhibition
Conventional Difference of Gaussian (DOG) filter is usually used to model the early stage of visual processing. However, convolution operation used with DOG does not explicitly a...
Yingwei Yu, Takashi Yamauchi, Yoonsuck Choe
ICMI
2004
Springer
235views Biometrics» more  ICMI 2004»
14 years 2 months ago
Multimodal detection of human interaction events in a nursing home environment
In this paper, we propose a multimodal system for detecting human activity and interaction patterns in a nursing home. Activities of groups of people are firstly treated as intera...
Datong Chen, Robert Malkin, Jie Yang
CCS
2003
ACM
14 years 2 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna