Sciweavers

92 search results - page 9 / 19
» Detecting Unknown Worms Using Randomness Check
Sort
View
DSN
2006
IEEE
14 years 1 months ago
Honeypot-Aware Advanced Botnet Construction and Maintenance
Because “botnets” can be used for illicit financial gain, they have become quite popular in recent Internet attacks. “Honeypots” have been successfully deployed in many d...
Cliff Changchun Zou, Ryan Cunningham
SAC
2010
ACM
14 years 2 months ago
Tracking random finite objects using 3D-LIDAR in marine environments
This paper presents a random finite set theoretic formulation for multi-object tracking as perceived by a 3D-LIDAR in a dynamic environment. It is mainly concerned with the joint...
Kwang Wee Lee, Bharath Kalyan, W. Sardha Wijesoma,...
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 5 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
ICIP
2008
IEEE
14 years 9 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
3DIM
2007
IEEE
14 years 1 months ago
Silhouette Extraction with Random Pattern Backgrounds for the Volume Intersection Method
In this paper, we present a novel approach for extracting silhouettes by using a particular pattern that we call the random pattern. The volume intersection method reconstructs th...
Masahiro Toyoura, Masaaki Iiyama, Koh Kakusho, Mic...