Sciweavers

2474 search results - page 478 / 495
» Attacks on Steganographic Systems
Sort
View
JUCS
2006
123views more  JUCS 2006»
14 years 11 months ago
Persian/Arabic Baffletext CAPTCHA
: Nowadays, many daily human activities such as education, trade, talks, etc are done by using the Internet. In such things as registration on Internet web sites, hackers write pro...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...
PR
2006
113views more  PR 2006»
14 years 11 months ago
Face recognition from a single image per person: A survey
One of the main challenges faced by the current face recognition techniques lies in the difficulties of collecting samples. Fewer samples per person mean less laborious effort for...
Xiaoyang Tan, Songcan Chen, Zhi-Hua Zhou, Fuyan Zh...
TPDS
2008
78views more  TPDS 2008»
14 years 11 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
CCR
2004
116views more  CCR 2004»
14 years 11 months ago
An empirical study of "bogon" route advertisements
An important factor in the robustness of the interdomain routing system is whether the routers in autonomous systems (ASes) filter routes for "bogon" address space--i.e....
Nick Feamster, Jaeyeon Jung, Hari Balakrishnan
JTAER
2010
121views more  JTAER 2010»
14 years 10 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...