Sciweavers

252 search results - page 34 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
VLSID
2006
IEEE
85views VLSI» more  VLSID 2006»
14 years 9 months ago
A Novel Architecture Using the Decorrelating Transform for Low Power Adaptive Filters
This paper presents a novel architecture using the decorrelating (DECOR) transformation technique when applied to an LMS adaptive filter. The DECOR transform has been evaluated pr...
Mark P. Tennant, Ahmet T. Erdogan, Tughrul Arslan,...
CORR
2012
Springer
209views Education» more  CORR 2012»
12 years 4 months ago
Densest Subgraph in Streaming and MapReduce
The problem of finding locally dense components of a graph is an important primitive in data analysis, with wide-ranging applications from community mining to spam detection and ...
Bahman Bahmani, Ravi Kumar, Sergei Vassilvitskii
NSPW
2004
ACM
14 years 2 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
IFIPTM
2009
119views Management» more  IFIPTM 2009»
13 years 6 months ago
Detection and Prevention of Insider Threats in Database Driven Web Services
In this paper, we take the first step to address the gap between the security needs in outsourced hosting services and the protection provided in the current practice. We consider ...
Tzvi Chumash, Danfeng Yao
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
13 years 7 days ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao