Sciweavers

19 search results - page 3 / 4
» Base Address Recognition with Data Flow Tracking for Injecti...
Sort
View
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 5 days ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
ACSAC
2004
IEEE
13 years 9 months ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
DIMVA
2008
13 years 6 months ago
Data Space Randomization
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflo...
Sandeep Bhatkar, R. Sekar
ICPR
2006
IEEE
14 years 6 months ago
ViSE: Visual Search Engine Using Multiple Networked Cameras
We propose a Visual Search Engine (ViSE) as a semi-automatic component in a surveillance system using networked cameras. The ViSE aims to assist the monitoring operation of huge a...
Anil K. Jain, Itaru Kitahara, Kiyoshi Kogure, Nori...
ICCV
2003
IEEE
14 years 7 months ago
A Sparse Probabilistic Learning Algorithm for Real-Time Tracking
This paper addresses the problem of applying powerful pattern recognition algorithms based on kernels to efficient visual tracking. Recently Avidan [1] has shown that object recog...
Oliver M. C. Williams, Andrew Blake, Roberto Cipol...