Sciweavers

7544 search results - page 31 / 1509
» Network Forensics Analysis
Sort
View
AAAI
2007
13 years 11 months ago
Adaptive Traitor Tracing with Bayesian Networks
The practical success of broadcast encryption hinges on the ability to (1) revoke the access of compromised keys and (2) determine which keys have been compromised. In this work w...
Philip Zigoris, Hongxia Jin
USS
2008
13 years 11 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
ICDAR
2007
IEEE
14 years 17 days ago
Towards Explainable Writer Verification and Identification Using Vantage Writers
In this paper, a new method for off-line writer verification and identification is proposed which encodes writer features as a mix of typical handwriting styles, written by so-cal...
Axel Brink, Lambert Schomaker, Marius Bulacu
ICDAR
2011
IEEE
12 years 8 months ago
Offline Writer Identification Using K-Adjacent Segments
— This paper presents a method for performing offline writer identification by using K-adjacent segment (KAS) features in a bag-of-features framework to model a user’s handwrit...
Rajiv Jain, David S. Doermann
MVA
2006
120views Computer Vision» more  MVA 2006»
13 years 8 months ago
A model of diatom shape and texture for analysis, synthesis and identification
We describe tools for automatic identification and classification of diatoms that compare photographs with other photographs and drawings, via a model. Identification of diatoms, i...
Yulia Hicks, A. David Marshall, Paul L. Rosin, Ral...