Sciweavers

113 search results - page 22 / 23
» Attacks on physical-layer identification
Sort
View
ISSA
2004
13 years 6 months ago
Using A Central Data Repository For Biometric Authentication In Passport Systems
Passports and visas are currently undergoing a rapid change due to legislation being passed by authorities such as the US requirement that they should have machine readable biomet...
Morné Breedt
AAAI
1990
13 years 6 months ago
A Proven Domain-Independent Scientific Function-Finding Algorithm
Programs such as Bacon, Abacus, Coper, Kepler and others are designed to find functional relationships of scientific significance in numerical data without relying on the deep dom...
Cullen Schaffer
BMCBI
2006
91views more  BMCBI 2006»
13 years 5 months ago
Cheminformatics methods for novel nanopore analysis of HIV DNA termini
Background: Channel current feature extraction methods, using Hidden Markov Models (HMMs) have been designed for tracking individual-molecule conformational changes. This informat...
Stephen Winters-Hilt, Matthew Landry, Mark Akeson,...
TPDS
2008
133views more  TPDS 2008»
13 years 5 months ago
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking
Tracing IP packets back to their origins is an important step in defending the Internet against denial-of-service (DoS) attacks. Two kinds of IP traceback techniques have been prop...
Chao Gong, Kamil Saraç
TPDS
2008
78views more  TPDS 2008»
13 years 5 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...