Sciweavers

7544 search results - page 33 / 1509
» Network Forensics Analysis
Sort
View
ICASSP
2010
IEEE
13 years 9 months ago
Beyond Doddington menagerie, a first step towards
During the last decade, speaker verification systems have shown significant progress and have reached a level of performance and accuracy that support their utilization in pract...
Juliette Kahn, Solange Rossato, Jean-Franço...
CIKM
2010
Springer
13 years 6 months ago
Towards a data-centric view of cloud security
Cloud security issues have recently gained traction in the research community, with much of the focus primarily concentrated on securing the operating systems and virtual machines...
Wenchao Zhou, Micah Sherr, William R. Marczak, Zhu...
IJACTAICIT
2010
189views more  IJACTAICIT 2010»
13 years 6 months ago
An Improved Algorithm for Data Hiding Using HH-subband Haar Wavelet Coefficients
This paper presents an improved adaptive algorithm for enhanced data hiding under HH-subband Haar Wavelet coefficients of a gray scale host image. The algorithm uses an optimal se...
Stuti Bazaj, Sachin Modi, Anand Mohan, S. P. Singh
ESORICS
2011
Springer
12 years 8 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
ICDE
2012
IEEE
238views Database» more  ICDE 2012»
11 years 11 months ago
Mining Knowledge from Data: An Information Network Analysis Approach
Abstract—Most objects and data in the real world are interconnected, forming complex, heterogeneous but often semistructured information networks. However, many database research...
Jiawei Han, Yizhou Sun, Xifeng Yan, Philip S. Yu