Sciweavers

74 search results - page 11 / 15
» Cross-Site Framing Attacks
Sort
View
PCM
2004
Springer
190views Multimedia» more  PCM 2004»
14 years 4 months ago
Mapping Energy Video Watermarking Algorithm Based on Compressed Domain
The paper presents a novel video watermarking scheme called Mapping Energy video Watermarking (MEW) for copyright protection. The watermark is embedded in the compressed domain and...
Lijun Wang, Hongxun Yao, Shaohui Liu, Wen Gao
DSN
2002
IEEE
14 years 3 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
INFOCOM
2005
IEEE
14 years 4 months ago
A study of analyzing network traffic as images in real-time
—This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively moni...
Seong Soo Kim, A. L. Narasimha Reddy
PCM
2009
Springer
114views Multimedia» more  PCM 2009»
14 years 3 months ago
Improving a Digital Rights Management Scheme for Video Broadcast
The security of content distribution is a critical issue that all the content providers have to treat seriously in order to guarantee their business. Emmanuel and Kankanhalli propo...
Yongdong Wu, Feng Bao
ACSAC
2006
IEEE
14 years 2 months ago
Specification-Based Intrusion Detection in WLANs
Wireless networking technologies based on the IEEE 802.11 series of standards fail to authenticate management frames and network card addresses and suffer from serious vulnerabili...
Rupinder Gill, Jason Smith, Andrew Clark