Sciweavers

1056 search results - page 51 / 212
» Identifying and Exploiting Ultrametricity
Sort
View

Publication
96views
13 years 7 months ago
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
BitTorrent is currently one of the most popular peer-to-peer systems. BitTorrent clients are widely spread all over the world and account for a large fraction of today’s Internet...
Karim El Defrawy, Minas Gjoka, Athina Markopoulou
CCS
2007
ACM
14 years 1 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
DSN
2003
IEEE
14 years 1 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
ICIP
2004
IEEE
14 years 9 months ago
Efficient and reliable dynamic quality control for compression of compound document images
Compound images contain a mixture of natural images, text, and graphics. They need special care in the use of compression because text and graphics cannot withstand the significan...
Amir Said
IUI
2009
ACM
14 years 4 months ago
You can play that again: exploring social redundancy to derive highlight regions in videos
Identifying highlights in multimedia content such as video and audio is currently a very difficult technical problem. We present and evaluate a novel algorithm that identifies hig...
Jose San Pedro, Vaiva Kalnikaité, Steve Whi...