Sciweavers

2269 search results - page 342 / 454
» Behavioral Intrusion Detection
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 4 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
NEW2AN
2007
Springer
14 years 4 months ago
Performance Analysis of the REAchability Protocol for IPv6 Multihoming
Abstract. There is ongoing work on the IETF aimed to provide support for different flavors of multihoming configurations, such as SHIM6 for multihomed sites, multiple CoAs suppo...
Antonio de la Oliva, Marcelo Bagnulo, Alberto Garc...
SCIA
2007
Springer
178views Image Analysis» more  SCIA 2007»
14 years 4 months ago
Occluded Facial Expression Tracking
The work presented here takes place in the field of computer aided analysis of facial expressions displayed in sign language videos. We use Active Appearance Models to model a fac...
Hugo Mercier, Julien Peyras, Patrice Dalle
ACSAC
2006
IEEE
14 years 4 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
INFOSCALE
2006
ACM
14 years 4 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray