Sciweavers

3451 search results - page 472 / 691
» Collaborative attack modeling
Sort
View
145
Voted
ATAL
2008
Springer
15 years 4 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...
114
Voted
HCI
2007
15 years 3 months ago
Aspects of Integrating User Centered Design into Software Engineering Processes
Software Engineering (SE) and Usability Engineering (UE) both provide a wide range of elaborated process models to create software solutions. Today, many companies have realized th...
Karsten Nebe, Dirk Zimmermann
135
Voted
ICON
2007
IEEE
15 years 8 months ago
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
— Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed MANET in the areas of...
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya...
97
Voted
ICIP
2005
IEEE
16 years 3 months ago
Detecting spread spectrum watermarks using natural scene statistics
This paper presents novel techniques for detecting watermarks in images in a known-cover attack framework using natural scene models. Specifically, we consider a class of watermar...
Kalpana Seshadrinathan, Hamid R. Sheikh, Alan C. B...
103
Voted
ICIP
2001
IEEE
16 years 3 months ago
Multibit digital watermarking robust against local nonlinear geometrical distortions
This paper presents an efficient method for the estimation and recovering from nonlinear or local geometrical distortions, such as the random bending attack and restricted project...
Frédéric Deguillaume, Sviatoslav Vol...