Sciweavers

429 search results - page 64 / 86
» Multivariate statistical analysis for network attacks detect...
Sort
View
SAC
2010
ACM
14 years 2 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
ICASSP
2011
IEEE
12 years 11 months ago
Graphical models for localization of the seizure focus from interictal intracranial EEG
Decision algorithms are developed that use periods of intracranial non-seizure (interictal) EEG to localize epileptogenic networks. Depth and surface recordings are considered fro...
Justin Dauwels, Emad N. Eskandar, Andy Cole, Dan H...
ACSAC
2007
IEEE
14 years 2 months ago
Routing in the Dark: Pitch Black
In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks, direct communication between nodes is limited to specific neighbors. Often these networks ...
Nathan S. Evans, Chris GauthierDickey, Christian G...
ICIP
2002
IEEE
14 years 9 months ago
Quantized projection data hiding
In this paper we propose a novel data hiding procedure called Quantized Projection (QP), that combines elements from quantization (i.e. Quantization Index Modulation, QIM) and spr...
Fernando Pérez-González, Féli...
ICST
2009
IEEE
14 years 2 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams