Sciweavers

256 search results - page 42 / 52
» CARDS: A Distributed System for Detecting Coordinated Attack...
Sort
View
NCA
2007
IEEE
14 years 1 months ago
A Topological Analysis of Monitor Placement
The Internet is an extremely complex system, and it is essential that we be able to make accurate measurements in order to understand its underlying behavior or to detect improper...
Alden W. Jackson, Walter C. Milliken, Cesar A. San...
SIGCOMM
2010
ACM
13 years 7 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
TC
2008
13 years 6 months ago
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise
Abstract--Testing security systems is challenging because a system's authors have to play the double role of attackers and defenders. Red Team/Blue Team exercises are an inval...
Jelena Mirkovic, Peter L. Reiher, Christos Papadop...
AVBPA
2005
Springer
426views Biometrics» more  AVBPA 2005»
14 years 8 days ago
Calculation of a Composite DET Curve
Abstract. The verification performance of biometric systems is normally evaluated using the receiver operating characteristic (ROC) or detection error trade-off (DET) curve. We p...
Andy Adler, Michael E. Schuckers
ECCV
2006
Springer
14 years 8 months ago
Robust Visual Tracking for Multiple Targets
We address the problem of robust multi-target tracking within the application of hockey player tracking. The particle filter technique is adopted and modified to fit into the multi...
Yizheng Cai, Nando de Freitas, James J. Little