Sciweavers

2236 search results - page 268 / 448
» Intrusion detection techniques and approaches
Sort
View
ESORICS
2011
Springer
12 years 10 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
ICDAR
2011
IEEE
12 years 10 months ago
Text-Line Extraction Using a Convolution of Isotropic Gaussian Filter with a Set of Line Filters
—Text-line extraction is a key task in document analysis. Methods based on anisotropic Gaussian filtering and ridge detection have shown good results. This paper describes perfo...
Syed Saqib Bukhari, Faisal Shafait, Thomas M. Breu...
DICTA
2003
14 years 4 days ago
Background Modeling and Subtraction Using a Local-linear-dependence-based Cauchy Statistical Model
:Many motion object detection algorithms rely on the process of background subtraction, an important technique which is used for detecting changes from a model of the background ...
Ying Ming, Jingjue Jiang, Jun Ming
ISBI
2006
IEEE
14 years 11 months ago
Bayesian tracking for fluorescence microscopic imaging
Fluorescence microscopy is a powerful imaging tool for studying molecular dynamics in living cells. For quantitative motion analysis of subcellular structures robust and accurate ...
Ihor Smal, Wiro J. Niessen, Erik H. W. Meijering
ACSAC
2006
IEEE
14 years 4 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...