Sciweavers

163 search results - page 26 / 33
» WiFi attack vectors
Sort
View
SAC
2008
ACM
13 years 9 months ago
Crime scene classification
In this paper we provide a study about crime scenes and its features used in criminal investigations. We argue that the crime scene provides a large set of features that can be us...
Ricardo O. Abu Hana, Cinthia Obladen de Almendra F...
BIOSIG
2009
104views Biometrics» more  BIOSIG 2009»
13 years 7 months ago
A Note on the Protection Level of Biometric Data in Electronic Passports
: Following regulations of the EU Council in 2004, the member states have deployed electronic passports according to ICAO standards. Such documents contain an embedded radio freque...
Harald Baier, Tobias Straub
IJNSEC
2010
112views more  IJNSEC 2010»
13 years 4 months ago
Detecting Connection-Chains: A Data Mining Approach
A connection-chain refers to a mechanism in which someone recursively logs into a host, then from there logs into another host, and so on. Connection-chains represent an important...
Ahmad Almulhem, Issa Traoré
WWW
2004
ACM
14 years 10 months ago
Web image learning for searching semantic concepts in image databases
Without textual descriptions or label information of images, searching semantic concepts in image databases is still a very challenging task. While automatic annotation techniques...
Chu-Hong Hoi, Michael R. Lyu
CEC
2005
IEEE
13 years 11 months ago
Nonlinear mapping using particle swarm optimisation
Abstract— Nonlinear mapping is an approach of multidimensional scaling where a high-dimensional space is transformed into a lower-dimensional space such that the topological char...
Auralia I. Edwards, Andries Petrus Engelbrecht, Ne...