Sciweavers

32 search results - page 1 / 7
» Early Recognition of Encrypted Applications
Sort
View
PAM
2007
Springer
13 years 11 months ago
Early Recognition of Encrypted Applications
Abstract. Most tools to recognize the application associated with network connections use well-known signatures as basis for their classification. This approach is very effective ...
Laurent Bernaille, Renata Teixeira
CSREASAM
2006
13 years 6 months ago
Software Vaccine Technique and Its Application in Early Virus
: The paper introduces a new anti-virus idea of Software Vaccine technique. It can apply the security technique inside the software itself. By inserting the software vaccine into t...
Xiaodong Yuan, Dajiong Yue
CORR
2011
Springer
167views Education» more  CORR 2011»
12 years 8 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
CVPR
2001
IEEE
14 years 6 months ago
A New 3-D Pattern Recognition Technique With Application to Computer Aided Colonoscopy
To utilize CT or MRI images for computer aided diagnosis applications, robust features that represent 3-D image data need to be constructed and subsequently used by a classificati...
Salih Burak Göktürk, Carlo Tomasi
ICC
2009
IEEE
115views Communications» more  ICC 2009»
13 years 11 months ago
Peer-to-Peer Application Recognition Based on Signaling Activity
—Because of the enormous growth in the number of peer-to-peer (P2P) applications in recent years, P2P traffic now constitutes a substantial proportion of Internet traffic. The ...
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Lau...