Sciweavers

526 search results - page 46 / 106
» Increase honeypot security through data analysis
Sort
View
CCS
2006
ACM
15 years 8 months ago
Bridging the gap between web application firewalls and web applications
Web applications are the Achilles heel of our current ICT infrastructure. NIST's national vulnerability database clearly shows that the percentage of vulnerabilities located ...
Lieven Desmet, Frank Piessens, Wouter Joosen, Pier...
CODES
2006
IEEE
15 years 10 months ago
Methodology for attack on a Java-based PDA
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...
Catherine H. Gebotys, Brian A. White
IEAAIE
2010
Springer
15 years 2 months ago
Driver's Behavior Assessment by On-board/Off-board Video Context Analysis
In the last few years, the application of ICT technologies in automotive field has taken an increasing role in improving both the safety and the driving comfort. In this context, s...
Lorenzo Ciardelli, Andrea Beoldo, Francesco Pasini...
BMCBI
2011
14 years 11 months ago
SNiPlay: a web-based tool for detection, management and analysis of SNPs. Application to grapevine diversity projects
Background: High-throughput re-sequencing, new genotyping technologies and the availability of reference genomes allow the extensive characterization of Single Nucleotide Polymorp...
Alexis Dereeper, Stéphane Nicolas, Loic Le ...
ICDAR
2009
IEEE
15 years 11 months ago
Writer Adaptive Online Handwriting Recognition Using Incremental Linear Discriminant Analysis
Writer adaptive handwriting recognition, which has potential of increasing accuracies for a particular user, is the process of converting a writer-independent recognition system t...
Zhibin Huang, Kai Ding, Lianwen Jin, Xue Gao