Sciweavers

935 search results - page 73 / 187
» Designing and implementing a family of intrusion detection s...
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
Automatically Generating Models for Botnet Detection
A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. We present a system that aims to detect bots, indepe...
Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan G...
DSN
2003
IEEE
14 years 2 months ago
Node Failure Detection and Membership in CANELy
Fault-tolerant distributed systems based on fieldbuses may benefit to a great extent from the availabilityof semantically rich communication services,such as those provided by g...
José Rufino, Paulo Veríssimo, Guilhe...
SASP
2009
IEEE
238views Hardware» more  SASP 2009»
14 years 3 months ago
Hardware acceleration of multi-view face detection
—This paper presents a parallelized architecture for hardware acceleration of multi-view face detection. In our architecture, the multi-view face detection system generates rotat...
Junguk Cho, Bridget Benson, Ryan Kastner
COMPSEC
2010
93views more  COMPSEC 2010»
13 years 9 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang
FPL
2005
Springer
119views Hardware» more  FPL 2005»
14 years 2 months ago
Real-Time Feature Extraction for High Speed Networks
With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support h...
David Nguyen, Gokhan Memik, Seda Ogrenci Memik, Al...