Sciweavers

2474 search results - page 477 / 495
» Attacks on Steganographic Systems
Sort
View
ATAL
2008
Springer
15 years 1 months ago
Using multi-agent potential fields in real-time strategy games
Bots for Real Time Strategy (RTS) games provide a rich challenge to implement. A bot controls a number of units that may have to navigate in a partially unknown environment, while...
Johan Hagelbäck, Stefan J. Johansson
USS
2004
15 years 1 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
ICMCS
2010
IEEE
149views Multimedia» more  ICMCS 2010»
14 years 12 months ago
Single-view recaptured image detection based on physics-based features
In daily life, we can see images of real-life objects on posters, television, or virtually any type of smooth physical surfaces. We seldom confuse these images with the objects pe...
Xinting Gao, Tian-Tsong Ng, Bo Qiu, Shih-Fu Chang
GRID
2006
Springer
14 years 11 months ago
Toward an On-Demand Restricted Delegation Mechanism for Grids
Grids are intended to enable cross-organizational interactions which makes Grid security a challenging and nontrivial issue. In Grids, delegation is a key facility that can be used...
Mehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee...
CN
2007
168views more  CN 2007»
14 years 11 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park