Sciweavers

708 search results - page 99 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
PERCOM
2007
ACM
14 years 8 months ago
Using Digital Cameras for Text Input on Mobile Devices
This paper presents novel text input methods for mobile devices. In particular, it shows how users can capture text from books, newspapers, and other objects by using the digital ...
Frank Siegemund, Muhammad Haroon
AINA
2010
IEEE
13 years 8 months ago
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bedig...
VIROLOGY
2008
121views more  VIROLOGY 2008»
13 years 8 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
CSREASAM
2006
13 years 10 months ago
Gibraltar: A Mobile Host-Based Intrusion Protection System
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...
VIIP
2001
13 years 10 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher