We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
We propose an analysis for detecting procedures and goals that are deterministic (i.e. that produce at most one solution), or predicates whose clause tests are mutually exclusive (...
Abstract— In this paper we describe the use of automatic exploration for autonomous mapping of outdoor scenes. We describe a real-time SLAM implementation along with an autonomou...
In this paper we explore the ability of the human visual system to detect inconsistencies in the illumination of objects in images. We specifically focus on objects being lit fro...
Jorge Lopez-Moreno, Veronica Sundstedt, Francisco ...
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...