Sciweavers

298 search results - page 41 / 60
» Towards experimental evaluation of code obfuscation techniqu...
Sort
View
ACSAC
2010
IEEE
13 years 6 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
ICIP
1997
IEEE
14 years 10 months ago
Higher order local autocorrelation features of PARCOR images for gesture recognition
This paper proposes a feature extraction method for gesture recognition, which is based on higher order local autocorrelation (HLAC) of PARCOR images. To extract dominant informat...
Takio Kurita, Yasuo Kobayashi, Taketoshi Mishima
IPPS
1997
IEEE
14 years 26 days ago
The Sparse Cyclic Distribution against its Dense Counterparts
Several methods have been proposed in the literature for the distribution of data on distributed memory machines, either oriented to dense or sparse structures. Many of the real a...
Gerardo Bandera, Manuel Ujaldon, María A. T...
RAID
2010
Springer
13 years 7 months ago
Inferring Protocol State Machine from Real-World Trace
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...
Yipeng Wang, Zhibin Zhang, Li Guo
ICIP
2010
IEEE
13 years 6 months ago
Global motion temporal filtering for in-loop deblocking
One of the most severe problems in hybrid video coding is its block-based approach, which leads to distortions called blocking artifacts. These artifacts affect not only the subje...
Alexander Glantz, Andreas Krutz, Thomas Sikora