Sciweavers

988 search results - page 29 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ICDE
2005
IEEE
183views Database» more  ICDE 2005»
14 years 2 months ago
Protection of Location Privacy using Dummies for Location-based Services
Recently, highly accurate positioning devices enable us to provide various types of location-based services. On the other hand, because position data obtained by such devices incl...
Hidetoshi Kido, Yutaka Yanagisawa, Tetsuji Satoh
GLOBECOM
2007
IEEE
14 years 3 months ago
A Technique to Enhance Localization in the Presence of NLOS Errors
— In a wireless network (WN), the wireless devices generally localize themselves with the help of anchors that are pre-deployed in the network. Some of the techniques commonly us...
Satyajayant Misra, Weiyi Zhang, Guoliang Xue
TDSC
2010
191views more  TDSC 2010»
13 years 7 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
PR
2008
140views more  PR 2008»
13 years 8 months ago
An incremental node embedding technique for error correcting output codes
The error correcting output codes (ECOC) technique is a useful way to extend any binary classifier to the multiclass case. The design of an ECOC matrix usually considers an a prio...
Oriol Pujol, Sergio Escalera, Petia Radeva
CCS
2010
ACM
13 years 9 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...