Sciweavers

420 search results - page 78 / 84
» Using static analysis for Ajax intrusion detection
Sort
View
ECML
2005
Springer
14 years 29 days ago
A Model Based Method for Automatic Facial Expression Recognition
Automatic facial expression recognition is a research topic with interesting applications in the field of human-computer interaction, psychology and product marketing. The classi...
Hans van Kuilenburg, Marco Wiering, Marten den Uyl
IPCV
2007
13 years 8 months ago
Tracking Multiple Sports Players for Mobile Display
- An architecture system and a method for tracking people are presented for sports applications. The system’s input is video data from static camera and the output is the real wo...
Andreas Aristidou, Paul Pangalos, Hamid Aghvami
DSN
2005
IEEE
14 years 1 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
ISSTA
2000
ACM
13 years 11 months ago
Finding bugs with a constraint solver
A method for finding bugs in code is presented. For given small numbers j and k, the code of a procedure is translated into a relational formula whose models represent all executi...
Daniel Jackson, Mandana Vaziri
CCS
2009
ACM
13 years 11 months ago
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy