Sciweavers

163 search results - page 30 / 33
» WiFi attack vectors
Sort
View
ISMIS
2005
Springer
14 years 3 months ago
Learning the Daily Model of Network Traffic
Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Costantina Caruso, Donato Malerba, Davide Papagni
MMSEC
2004
ACM
109views Multimedia» more  MMSEC 2004»
14 years 3 months ago
Statistical characterisation of MP3 encoders for steganalysis
This paper outlines a strategy to discriminate different ISO/ MPEG 1 Audio Layer-3 (MP3) encoding programs by statistical particularities of the compressed audio streams. We use ...
Rainer Böhme, Andreas Westfeld
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 9 months ago
Wide spread spectrum watermarking with side information and interference cancellation
Nowadays, a popular method used for additive watermarking is wide spread spectrum. It consists in adding a spread signal into the host document. This signal is obtained by the sum...
Gaëtan Le Guelvouit, Stéphane Pateux
VIROLOGY
2008
121views more  VIROLOGY 2008»
13 years 9 months ago
Constructing malware normalizers using term rewriting
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation engines are used at distribution sites or in self-pro...
Andrew Walenstein, Rachit Mathur, Mohamed R. Chouc...
CORR
2004
Springer
146views Education» more  CORR 2004»
13 years 9 months ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham