Sciweavers

487 search results - page 54 / 98
» Integral Invariant Signatures
Sort
View
ISSA
2004
13 years 11 months ago
Security Considerations In A Global Message Service Handler Design
: Web services are generally accepted as the most interoperable application interface today on the Web. In the context of a global electronic marketplace this is an essential facto...
Johannes J. van Eeden
CRITIS
2009
13 years 11 months ago
Towards Early Warning Systems - Challenges, Technologies and Architecture
We present the architecture of an automatic early warning system (EWS) that aims at providing predictions and advice regarding security threats in information and communication tec...
Martin Apel, Joachim Biskup, Ulrich Flegel, Michae...
IJCV
2010
194views more  IJCV 2010»
13 years 8 months ago
Improving Bag-of-Features for Large Scale Image Search
This article improves recent methods for large scale image search. We first analyze the bag-of-features approach in the framework of approximate nearest neighbor search. This lea...
Herve Jegou, Matthijs Douze, Cordelia Schmid
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
14 years 4 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 4 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode