Sciweavers

159 search results - page 6 / 32
» A Practical Solution to Corner Detection
Sort
View
88
Voted
ICDIM
2010
IEEE
14 years 6 months ago
Detecting incompleteness in access control policies using data classification schemes
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain un...
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serg...
CRITIS
2007
14 years 11 months ago
Detecting DNS Amplification Attacks
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS ...
Georgios Kambourakis, Tassos Moschos, Dimitris Gen...
87
Voted
CONEXT
2007
ACM
14 years 11 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
84
Voted
CRV
2009
IEEE
183views Robotics» more  CRV 2009»
15 years 24 days ago
Bayesian Tracking of Linear Structures in Aerial Images
The interpretation of aerial images is difficult, especially for low-resolution images. Although solutions have been worked on for many years, performance of these systems is sti...
Rui Gao, Walter F. Bischof
GLOBECOM
2009
IEEE
15 years 4 months ago
Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks
Abstract—Gray hole attacks (a.k.a selective forwarding attacks) are a special case of denial of service (DoS) attack, where a misbehaving mesh router just forwards a subset of th...
Devu Manikantan Shila, Yu Cheng, Tricha Anjali