Sciweavers

796 search results - page 55 / 160
» Spoofing prevention method
Sort
View
JDCTA
2010
250views more  JDCTA 2010»
14 years 9 months ago
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Thekra Abbas, Zou Beiji
147
Voted
CVPR
2011
IEEE
14 years 6 months ago
Total Recall II: Query Expansion Revisited
Most effective particular object and image retrieval approaches are based on the bag-of-words (BoW) model. All state-of-the-art retrieval results have been achieved by methods tha...
Ondrej Chum, Andrej Mikulik, Michal Perdoch, Jiri ...
113
Voted
SAC
2010
ACM
15 years 9 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...
115
Voted
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
15 years 9 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
95
Voted
DIMVA
2007
15 years 4 months ago
Distributed Evasive Scan Techniques and Countermeasures
Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the inf...
Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song