Sciweavers

507 search results - page 72 / 102
» Attacking DDoS at the Source
Sort
View
WISTP
2010
Springer
14 years 7 months ago
Efficient and Effective Buffer Overflow Protection on ARM Processors
Although many countermeasures have been developed for desktop and server environments, buffer overflows still pose a big threat. The same approach can be used to target mobile devi...
Raoul Strackx, Yves Younan, Pieter Philippaerts, F...
GI
2009
Springer
14 years 7 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
WWW
2004
ACM
15 years 10 months ago
Web taxonomy integration using support vector machines
We address the problem of integrating objects from a source taxonomy into a master taxonomy. This problem is not only currently pervasive on the web, but also important to the eme...
Dell Zhang, Wee Sun Lee
CVPR
2010
IEEE
15 years 6 months ago
Learning from Interpolated Images using Neural Networks for Digital Forensics
Interpolated images have data redundancy, and special correlation exists among neighboring pixels, which is a crucial clue in digital forensics. We design a neural network based f...
Yizhen Huang, Na Fan
APNOMS
2009
Springer
15 years 4 months ago
A PKI Based Mesh Router Authentication Scheme to Protect from Malicious Node in Wireless Mesh Network
Wireless mesh network can increase service coverage by low-cost multiple-paths between a source and a destination. But because of the wireless nature, wireless mesh network is vuln...
Kwang Hyun Lee, Choong Seon Hong