Sciweavers

173 search results - page 23 / 35
» Classification of RFID Attacks
Sort
View
ICMCS
2007
IEEE
130views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Mining Information of Attack-Defense Status from Soccer Video Based on Scene Analysis
Video Content is always huge by itself with abundant information. Extracting explicit semantic information has been extensively investigated such as object detection, structure an...
Shuqiang Jiang, Qingming Huang, Wen Gao
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
14 years 8 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek

Publication
270views
12 years 6 months ago
A Data Hiding Scheme Based on LBPROT Pattern
Texture classification is mainly used for segmentation of texture regions and content-based access to image databases. Lately these texture classification patterns have been appl...
E. E. Varsaki, V. Fotopoulos, A. N. Skodras
CHI
2008
ACM
14 years 8 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
ACSAC
2007
IEEE
14 years 2 months ago
Spector: Automatically Analyzing Shell Code
Detecting the presence of buffer overflow attacks in network messages has been a major focus. Only knowing whether a message contains an attack, however, is not always enough to m...
Kevin Borders, Atul Prakash, Mark Zielinski