Sciweavers

55 search results - page 10 / 11
» InnoDB Database Forensics
Sort
View
HICSS
2007
IEEE
222views Biometrics» more  HICSS 2007»
13 years 12 months ago
Battery-Sensing Intrusion Protection for Wireless Handheld Computers Using a Dynamic Threshold Calculation Algorithm for Attack
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
SIBGRAPI
2007
IEEE
13 years 12 months ago
Dental Biometrics: Human Identification Based On Dental Work Information
Dental biometrics is used in forensic dentistry to identify or verify persons based on their dental radiographs. This paper presents a method for human identification based on den...
Michael Hofer, Aparecido Nilceu Marana
MEDIAFORENSICS
2010
13 years 7 months ago
Alignment and bit extraction for secure fingerprint biometrics
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure bio...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
CN
2007
133views more  CN 2007»
13 years 5 months ago
Automatic high-performance reconstruction and recovery
Self-protecting systems require the ability to instantaneously detect malicious activity at run-time and prevent execution. We argue that it is impossible to perfectly self-protec...
Ashvin Goel, Wu-chang Feng, Wu-chi Feng, David Mai...
KDD
2005
ACM
124views Data Mining» more  KDD 2005»
14 years 6 months ago
Scalable discovery of hidden emails from large folders
The popularity of email has triggered researchers to look for ways to help users better organize the enormous amount of information stored in their email folders. One challenge th...
Giuseppe Carenini, Raymond T. Ng, Xiaodong Zhou