Sciweavers

142 search results - page 19 / 29
» Statistical Approaches to DDoS Attack Detection and Response
Sort
View
RAID
2004
Springer
14 years 1 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
COMCOM
2008
87views more  COMCOM 2008»
13 years 8 months ago
Providing VANET security through active position detection
Vehicle position is one of the most valuable pieces of information in a Vehicular Adhoc NETwork (VANET). The main contribution of this work is a novel approach to enhancing positi...
Gongjun Yan, Stephan Olariu, Michele C. Weigle
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
13 years 12 months ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
RAID
2007
Springer
14 years 2 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
ICIP
2006
IEEE
14 years 9 months ago
Towards a Robust Feature-Based Watermarking Scheme
This paper presents a feature-based watermarking scheme which is robust to geometric and common image processing attacks. The improved Harris corner detector is used to find the r...
Jonathan Weinheimer, Xiaojun Qi, Ji Qi