Sciweavers

87 search results - page 4 / 18
» Using Delay to Defend Against Database Extraction
Sort
View
MVA
2007
309views Computer Vision» more  MVA 2007»
13 years 7 months ago
Robust Facial Feature Extraction Using Embedded Hidden Markov Model for Face Recognition under Large Pose Variation
We propose an algorithm for extracting facial features robustly from images for face recognition under large pose variation. Rectangular facial features are retrieved via the by-p...
Ping-Han Lee, Yun-Wen Wang, Jison Hsu, Ming-Hsuan ...
ACSAC
2008
IEEE
14 years 2 months ago
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense
A new class of stealthy kernel-level malware, called transient kernel control flow attacks, uses dynamic soft timers to achieve significant work while avoiding any persistent ch...
Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calt...
COMCOM
2006
88views more  COMCOM 2006»
13 years 7 months ago
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
To defend against multi-step intrusions in high-speed networks, efficient algorithms are needed to correlate isolated alerts into attack scenarios. Existing correlation methods us...
Lingyu Wang, Anyi Liu, Sushil Jajodia
ASWEC
2006
IEEE
14 years 1 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
ASUNAM
2009
IEEE
14 years 20 days ago
Filtering Spam in Social Tagging System with Dynamic Behavior Analysis
—Spam in social tagging systems introduced by some malicious participants has become a serious problem for its global popularizing. Some studies which can be deduced to static us...
Bo Liu, Ennan Zhai, Huiping Sun, Yelu Chen, Zhong ...