Sciweavers

18 search results - page 2 / 4
» The Secure Pipes and Filters Pattern
Sort
View
142
Voted
ICWE
2009
Springer
15 years 1 months ago
A Component-Based Approach for Engineering Enterprise Mashups
Mashup applications combine pieces of functionality from several existing, heterogeneous sources to provide new integrated functionality. This paper presents the design of an enter...
Javier López, Fernando Bellas, Alberto Pan,...
141
Voted
MEDIAFORENSICS
2010
15 years 5 months ago
Efficient estimation of CFA pattern configuration in digital camera images
This paper proposes an efficient method to determine the concrete configuration of the color filter array (CFA) from demosaiced images. This is useful to decrease the degrees of f...
Matthias Kirchner
ACSAC
2008
IEEE
15 years 10 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
186
Voted
ANCS
2005
ACM
15 years 9 months ago
Fast and scalable pattern matching for content filtering
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packe...
Sarang Dharmapurikar, John W. Lockwood
AINA
2008
IEEE
15 years 10 months ago
Improved TCAM-Based Pre-Filtering for Network Intrusion Detection Systems
—With the increasing growth of the Internet, the explosion of attacks and viruses significantly affects the network security. Network Intrusion Detection System (NIDS) is develop...
Yeim-Kuan Chang, Ming-Li Tsai, Cheng-Chien Su