Sciweavers

80 search results - page 15 / 16
» Operator-Centric and Adaptive Intrusion Detection
Sort
View
ICMCS
2008
IEEE
108views Multimedia» more  ICMCS 2008»
13 years 11 months ago
Lower attentive region detection for virtual content insertion in broadcast video
Virtual Content Insertion (VCI) is an emerging application of video analysis. For VCI the spatial position is very important as improper placement will make the insertion intrusiv...
Huiying Liu, Shuqiang Jiang, Qingming Huang, Chang...
AAAI
2006
13 years 6 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
13 years 11 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
SAC
2009
ACM
14 years 2 days ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
INFOCOM
2009
IEEE
13 years 12 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...