Sciweavers

98 search results - page 18 / 20
» Utilizing network features for privacy violation detection
Sort
View
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
14 years 1 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...
ISM
2005
IEEE
91views Multimedia» more  ISM 2005»
14 years 29 days ago
Research on the Discrimination of Pornographic and Bikini Images
Our research extends the general technologies detecting pornographic images to prevent the benign images whose content is approximate with the pornographic ones from being screene...
Yushi Wang, Weiqiang Wang, Wen Gao
ACSAC
2009
IEEE
14 years 2 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
ICPR
2006
IEEE
14 years 8 months ago
A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis
Computer based analysis for automated segmentation of blood vessels in retinal images will help eye care specialists screen larger populations for vessel abnormalities. However, a...
Qin Li, Lei Zhang, David Zhang, Prabir Bhattachary...
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
14 years 1 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King