Sciweavers

796 search results - page 44 / 160
» Spoofing prevention method
Sort
View
RAID
2010
Springer
13 years 8 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
BMVC
2010
13 years 8 months ago
Generalized Descriptor Compression for Storage and Matching
Smarter phones have made handheld computer vision a reality, but limited bandwidth, storage space and processing power prevent mobile phones from leveraging the full body of exist...
Matthew Johnson
DIMVA
2010
13 years 8 months ago
KIDS - Keyed Intrusion Detection System
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to m...
Sasa Mrdovic, Branislava Drazenovic
IPPS
2010
IEEE
13 years 7 months ago
Optimizing RAID for long term data archives
We present new methods to extend data reliability of disks in RAID systems for applications like long term data archival. The proposed solutions extend existing algorithms to detec...
Henning Klein, Jörg Keller
AAAI
2012
12 years 9 days ago
Evaluating Resistance to False-Name Manipulations in Elections
In many mechanisms (especially online mechanisms), a strategic agent can influence the outcome by creating multiple false identities. We consider voting settings where the mechan...
Bo Waggoner, Lirong Xia, Vincent Conitzer