Sciweavers

50 search results - page 6 / 10
» Target detection via network filtering
Sort
View
136
Voted
NDSS
2000
IEEE
15 years 7 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
IJIT
2004
15 years 4 months ago
Morphing Human Faces: Automatic Control Points Selection And Color Transition
In this paper, we propose a morphing method by which face color images can be freely transformed. The main focus of this work is the transformation of one face image to another. Th...
Stephen Karungaru, Minoru Fukumi, Norio Akamatsu
110
Voted
DSN
2008
IEEE
15 years 10 months ago
Evaluating email's feasibility for botnet command and control
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have.focused on filtering out malicious payloa...
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffi...
162
Voted
IJACTAICIT
2010
163views more  IJACTAICIT 2010»
15 years 23 days ago
Modified Vector Field Histogram with a Neural Network Learning Model for Mobile Robot Path Planning and Obstacle Avoidance
In this work, a Modified Vector Field Histogram (MVFH) has been developed to improve path planning and obstacle avoidance for a wheeled driven mobile robot. It permits the detecti...
Bahaa I. Kazem, Ali H. Hamad, Mustafa M. Mozael
136
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...