Sciweavers

556 search results - page 75 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
123
Voted
DIMVA
2011
14 years 5 months ago
Escape from Monkey Island: Evading High-Interaction Honeyclients
Abstract. High-interaction honeyclients are the tools of choice to detect malicious web pages that launch drive-by-download attacks. Unfortunately, the approach used by these tools...
Alexandros Kapravelos, Marco Cova, Christopher Kru...
ICPR
2008
IEEE
16 years 3 months ago
Multiple kernel learning from sets of partially matching image features
Abstract: Kernel classifiers based on Support Vector Machines (SVM) have achieved state-ofthe-art results in several visual classification tasks, however, recent publications and d...
Guo ShengYang, Min Tan, Si-Yao Fu, Zeng-Guang Hou,...
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 1 months ago
Detecting Danger: The Dendritic Cell Algorithm
l invaders in the form of pathogens. In this research, and abstract model of DC behaviour is developed and subsequently used to form an algorithm, the DCA. The abstraction process ...
Julie Greensmith, Uwe Aickelin, Steve Cayzer
EUROCRYPT
2010
Springer
15 years 6 months ago
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
Abstract. Physical computational devices leak side-channel information that may, and often does, reveal secret internal states. We present a general transformation that compiles an...
Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tr...
VTC
2010
IEEE
124views Communications» more  VTC 2010»
15 years 7 days ago
A Novel Sampling Method for the Spatial Frequencies of Sinusoid-Based Shadowing Models
Abstract—Careful modeling of the radio channel characteristics is an important issue for system level simulations. While a number of detailed path loss, shadowing and fast fading...
Siegfried Klein, Serkan Uygungelen, Christian M. M...