Sciweavers

2474 search results - page 439 / 495
» Attacks on Steganographic Systems
Sort
View
PADS
2005
ACM
15 years 5 months ago
Requirements on Worm Mitigation Technologies in MANETS
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA Defense Against Cybe...
Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andr...
SENSYS
2005
ACM
15 years 5 months ago
A new approach for establishing pairwise keys for securing wireless sensor networks
Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symme...
Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rother...
IH
2005
Springer
15 years 5 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
ISMIR
2005
Springer
165views Music» more  ISMIR 2005»
15 years 5 months ago
Using a Pitch Detector for Onset Detection
A segmentation strategy is explored for monophonic instrumental pitched non-percussive material (PNP) which proceeds from the assertion that human-like event analysis can be found...
Nick Collins
ISSADS
2005
Springer
15 years 5 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...