Sciweavers

115 search results - page 22 / 23
» ccs 2009
Sort
View
SOUPS
2009
ACM
13 years 11 months ago
Machine learning attacks against the Asirra CAPTCHA
The ASIRRA CAPTCHA [6], recently proposed at ACM CCS 2007, relies on the problem of distinguishing images of cats and dogs (a task that humans are very good at). The security of AS...
Philippe Golle
CGI
2009
IEEE
13 years 9 months ago
Visual analytics of time dependent 2D point clouds
Two dimensional point data can be considered one of the most basic, yet one of the most ubiquitous data types arising in a wide variety of applications. The basic scatter plot app...
Tatiana von Landesberger, Sebastian Bremm, Peyman ...
3DOR
2009
13 years 6 months ago
Retrieval of 3D Articulated Objects Using a Graph-based Representation
Most of the approaches which address the problem of 3D object retrieval, use global descriptors of the objects which fail to consistently compensate for the intra-class variabilit...
Alexander Agathos, Ioannis Pratikakis, Panagiotis ...
CCS
2009
ACM
14 years 6 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
CCS
2009
ACM
14 years 6 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...