Sciweavers

923 search results - page 158 / 185
» Improved Slide Attacks
Sort
View
SMI
2003
IEEE
131views Image Analysis» more  SMI 2003»
14 years 3 months ago
Watermarking 2D Vector Maps in the Mesh-Spectral Domain
This paper proposes a digital watermarking algorithm for 2D vector digital maps. The watermark is a robust, informed-detection watermark to be used to prevent such abuses as an in...
Ryutarou Ohbuchi, Hiroo Ueda, Shuh Endoh
DSOM
2003
Springer
14 years 3 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
MICRO
2002
IEEE
122views Hardware» more  MICRO 2002»
14 years 2 months ago
Microarchitectural denial of service: insuring microarchitectural fairness
Simultaneous multithreading seeks to improve the aggregate computation bandwidth of a processor core by sharing resources such as functional units, caches, TLB and so on. To date,...
Dirk Grunwald, Soraya Ghiasi
AINA
2010
IEEE
14 years 2 months ago
The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS
—Network Intrusion Detection System (NIDS) is a system which can detect network attacks resulted from worms and viruses on the Internet. An efficient pattern matching algorithm p...
Yeim-Kuan Chang, Chen-Rong Chang, Cheng-Chien Su
HUC
2009
Springer
14 years 2 months ago
Authenticating ubiquitous services: a study of wireless hotspot access
: © Authenticating Ubiquitous Services: A Study of Wireless Hotspot Access Tim Kindberg, Chris Bevan, Eamonn O'Neill, James Mitchell, Jim Grimmett, Dawn Woodgate HP Laborator...
Tim Kindberg, Chris Bevan, Eamonn O'Neill, James M...