Sciweavers

24 search results - page 5 / 5
» Integrating Innate and Adaptive Immunity for Intrusion Detec...
Sort
View
AAAI
2006
13 years 6 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
ICMCS
2008
IEEE
108views Multimedia» more  ICMCS 2008»
13 years 11 months ago
Lower attentive region detection for virtual content insertion in broadcast video
Virtual Content Insertion (VCI) is an emerging application of video analysis. For VCI the spatial position is very important as improper placement will make the insertion intrusiv...
Huiying Liu, Shuqiang Jiang, Qingming Huang, Chang...
KESAMSTA
2009
Springer
13 years 9 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial
SAC
2009
ACM
13 years 11 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...