Sciweavers

44 search results - page 4 / 9
» Detecting Possible Manipulators in Elections
Sort
View
MEDIAFORENSICS
2010
13 years 6 months ago
On detection of median filtering in digital images
In digital image forensics, it is generally accepted that intentional manipulations of the image content are most critical and hence numerous forensic methods focus on the detecti...
Matthias Kirchner, Jessica J. Fridrich
ICNP
2007
IEEE
13 years 11 months ago
Greedy Virtual Coordinates for Geographic Routing
— We present a new approach for generating virtual coordinates that produces usable coordinates quickly and improves the routing performance of existing geographic routing algori...
Ben Leong, Barbara Liskov, Robert Morris
EPIA
2003
Springer
13 years 10 months ago
Using CLIPS to Detect Network Intrusions
We describe how to build a network intrusion detection sensor by slightly modifying NASA’s CLIPS source code introducing some new features. An overview of the system is presente...
Pedro Alípio, Paulo Carvalho, José N...
HICSS
2006
IEEE
83views Biometrics» more  HICSS 2006»
13 years 11 months ago
Vigilance and Error Detection in an Automated Command and Control Environment
This study focused on improving vigilance performance through developing methods to arouse subjects to the possibility of errors in a data manipulation information warfare attack....
David P. Biros, Kent Marett, Brent T. Langhals
ICDCS
2006
IEEE
13 years 11 months ago
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks
In IEEE 802.11 based ad hoc networks, by simply manipulating the back-off timers and/or wait times prior to transmission, malicious nodes can cause a drastically reduced allocatio...
Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. ...