Sciweavers

624 search results - page 119 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
COMSWARE
2007
IEEE
15 years 3 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
GLOBECOM
2007
IEEE
15 years 3 months ago
Discovering Topologies at Router Level: Part II
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...
IPOM
2005
Springer
15 years 2 months ago
Discovering Topologies at Router Level
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Donato Emma, Antonio Pescapè, Giorgio Ventr...
MMSEC
2004
ACM
109views Multimedia» more  MMSEC 2004»
15 years 2 months ago
Statistical characterisation of MP3 encoders for steganalysis
This paper outlines a strategy to discriminate different ISO/ MPEG 1 Audio Layer-3 (MP3) encoding programs by statistical particularities of the compressed audio streams. We use ...
Rainer Böhme, Andreas Westfeld
MMSEC
2004
ACM
126views Multimedia» more  MMSEC 2004»
15 years 2 months ago
Key-dependency for a wavelet-based blind watermarking algorithm
When a host image is watermarked multiple times by the same algorithm collisions can occur. This makes it difficult for an image to host multiple watermarks. But this hosting is n...
Michael Brachtl, Andreas Uhl, Werner Dietl