Sciweavers

1816 search results - page 191 / 364
» Trace oblivious computation
Sort
View
LCN
2006
IEEE
14 years 3 months ago
Detecting Botnets with Tight Command and Control
Systems are attempting to detect botnets by examining traffic content for IRC commands or by setting up honeynets. Our approach for detecting botnets is to examine flow characteri...
W. Timothy Strayer, Robert Walsh, Carl Livadas, Da...
ACSAC
2005
IEEE
14 years 2 months ago
The Pump: A Decade of Covert Fun
This paper traces the ten plus year history of the Naval Research Laboratory’s Pump idea. The Pump was theorized, designed, and built at the Naval Research Laboratory’s Center...
Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck
SADFE
2005
IEEE
14 years 2 months ago
Detecting Digital Tampering by Blur Estimation
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
Dun-Yu Hsiao, Soo-Chang Pei
MMSEC
2005
ACM
129views Multimedia» more  MMSEC 2005»
14 years 2 months ago
Exposing digital forgeries by detecting inconsistencies in lighting
When creating a digital composite of, for example, two people standing side-by-side, it is often difficult to match the lighting conditions from the individual photographs. Lighti...
Micah K. Johnson, Hany Farid
AIED
2005
Springer
14 years 2 months ago
Generating Reports of Graphical Modelling Processes for Authoring and Presentation
Today's computer supported modelling environments could provide much more information about the users’ actions and problem solving processes than they usually store for late...
Lars Bollen