Sciweavers

988 search results - page 8 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ICIP
2008
IEEE
14 years 10 months ago
Managing privacy data in pervasive camera networks
Privacy protection of visual information is increasingly important as pervasive camera networks becomes more prevalent. The proposed scheme addresses the problem of preserving and...
Sen-Ching S. Cheung, Jithendra K. Paruchuri, Thinh...
CEAS
2004
Springer
14 years 2 months ago
Stopping Spam by Extrusion Detection
End users are often unaware that their systems have been compromised and are being used to send bulk unsolicited email (spam). We show how automated processing of the email logs re...
Richard Clayton
WCRE
2009
IEEE
14 years 3 months ago
Static Detection of Disassembly Errors
—Static disassembly is a crucial first step in reverse engineering executable files, and there is a considerable body of work in reverse-engineering of binaries, as well as are...
Nithya Krishnamoorthy, Saumya K. Debray, Keith Fli...
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 3 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ICASSP
2008
IEEE
14 years 3 months ago
Robust adaptive beamforming for general-rank signal models using positive semi-definite covariance constraint
In this paper, we develop an improved approach to the worstcase robust adaptive beamforming for general-rank signal models by means of taking into account the positive semi-defin...
Haihua Chen, Alex B. Gershman