Sciweavers

708 search results - page 132 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
DSN
2009
IEEE
14 years 4 months ago
Comparing anomaly-detection algorithms for keystroke dynamics
Keystroke dynamics—the analysis of typing rhythms to discriminate among users—has been proposed for detecting impostors (i.e., both insiders and external attackers). Since man...
Kevin S. Killourhy, Roy A. Maxion
CONEXT
2008
ACM
13 years 11 months ago
High performance traffic shaping for DDoS mitigation
Distributed Denial of Service (DDoS) attack mitigation systems usually generate a list of filter rules in order to block malicious traffic. In contrast to this binary decision we ...
Markus Goldstein, Matthias Reif, Armin Stahl, Thom...
RAID
2010
Springer
13 years 8 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
MVA
2000
232views Computer Vision» more  MVA 2000»
13 years 9 months ago
Automatic extraction of roads from aerial images based on scale space and snakes
We propose a new approach for automatic road extraction from aerial imagery with a model and a strategy mainly based on the multi-scale detection of roads in combination with geome...
Ivan Laptev, Helmut Mayer, Tony Lindeberg, Wolfgan...
CIC
2003
150views Communications» more  CIC 2003»
13 years 11 months ago
Performance Modeling of a Cluster of Workstations
Using off-the-shelf commodity workstations to build a cluster for parallel computing has become a common practice. In studying or designing a cluster of workstations one should ha...
Ahmed M. Mohamed, Lester Lipsky, Reda A. Ammar