Sciweavers

2236 search results - page 299 / 448
» Intrusion detection techniques and approaches
Sort
View
GLOBECOM
2006
IEEE
14 years 4 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
14 years 4 months ago
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
Chun-Shien Lu, Chia-Mu Yu
IBPRIA
2003
Springer
14 years 3 months ago
Robust Extraction of Vertices in Range Images by Constraining the Hough Transform
We describe a technique for extracting vertices from range images of cluttered box-like objects. Edge detection is performed and an edge map is acquired. Extraction of vertices is ...
Dimitrios Katsoulas
UM
2010
Springer
14 years 3 months ago
Analyzing Community Knowledge Sharing Behavior
The effectiveness of support provided to virtual communities depends strongly on what we know about a particular community of people and in what areas the community needs support....
Styliani Kleanthous, Vania Dimitrova
GLVLSI
2002
IEEE
136views VLSI» more  GLVLSI 2002»
14 years 3 months ago
Test generation for resistive opens in CMOS
This paper develops new techniques for detecting both stuck-open faults and resistive open faults, which result in increased delays along some paths. The improved detection of CMO...
Arun Krishnamachary, Jacob A. Abraham