Sciweavers

2474 search results - page 455 / 495
» Attacks on Steganographic Systems
Sort
View
CORR
2010
Springer
286views Education» more  CORR 2010»
14 years 8 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
WWW
2011
ACM
14 years 6 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
JSAC
2010
170views more  JSAC 2010»
14 years 6 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...
TITS
2010
286views Education» more  TITS 2010»
14 years 6 months ago
Understanding Transit Scenes: A Survey on Human Behavior-Recognition Algorithms
Visual surveillance is an active research topic in image processing. Transit systems are actively seeking new or improved ways to use technology to deter and respond to accidents, ...
Joshua Candamo, Matthew Shreve, Dmitry B. Goldgof,...
ICASSP
2011
IEEE
14 years 3 months ago
Authentication of fingerprint scanners
Fingerprint scanners have unique patterns that can be used to distinguish one scanner from another one. The pattern, which we call scanner pattern, stems from the variability of d...
Vladimir I. Ivanov, John S. Baras