Sciweavers

1875 search results - page 357 / 375
» Modeling the Security of Steganographic Systems
Sort
View
DIMVA
2008
13 years 11 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
PDPTA
2004
13 years 11 months ago
Semantic Extensions for the Virtual Enterprise's Grid Infastructure
Construction activities take place in what can be called a dynamic virtual organization (VO). VOs require a secure, reliable, scalable information infrastructure that allows collab...
Ziga Turk, Vlado Stankovski, Matevz Dolenc, Tomo C...
MM
2010
ACM
252views Multimedia» more  MM 2010»
13 years 10 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
CCR
2008
122views more  CCR 2008»
13 years 10 months ago
Cyclops: the AS-level connectivity observatory
In this paper we present Cyclops, a system that collects and displays information of AS-level connectivity extracted from looking glasses, route-servers and BGP tables and updates...
Ying-Ju Chi, Ricardo V. Oliveira, Lixia Zhang
CLEIEJ
2006
147views more  CLEIEJ 2006»
13 years 10 months ago
JADIMA: Virtual Machine Architecture for building JAVA Applications on Grid Platforms
This paper describes JADIMA (Java Distributed Machine), a collaborative platform to construct high performance distributed JAVA applications. JADIMA is a system that automatically...
Yudith Cardinale, Eduardo Blanco, Jesús De ...