Sciweavers

5386 search results - page 994 / 1078
» Approaches to Multimedia and Security
Sort
View
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
14 years 11 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
BIOSIG
2008
166views Biometrics» more  BIOSIG 2008»
14 years 11 months ago
Improving Border Control with 3D Face Recognition
: Biometric data have been integrated in all new European passports, since the member states of the European Commission started to implement the EU Council Regulation No 2252/2004 ...
Paul Welti, Jean-Marc Suchier, Christoph Busch
CSREASAM
2008
14 years 11 months ago
3D Face Recognition for Unattended Border Control
Biometric data have been integrated in all new European passports, since the member states of the European Commission started to implement the EU Council Regulation No 2252/2004 on...
Christoph Busch, Alexander Nouak
DIMVA
2008
14 years 11 months ago
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks
Abstract. This paper focuses on defense mechanisms for cross-site scripting attacks, the top threat on web applications today. It is believed that input validation (or filtering) c...
Prithvi Bisht, V. N. Venkatakrishnan
MASCOTS
2010
14 years 11 months ago
RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage
Recording raw network traffic for long-term periods can be extremely beneficial for a multitude of monitoring and security applications. However, storing all traffic of high volume...
Antonis Papadogiannakis, Michalis Polychronakis, E...