Sciweavers

74 search results - page 10 / 15
» Automated Worm Fingerprinting
Sort
View
USS
2004
15 years 12 days ago
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Niels Provos
86
Voted
NOMS
2008
IEEE
15 years 5 months ago
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks
Abstract—System availability is difficult for systems to maintain in the face of Internet worms. Large systems have vulnerabilities, and if a system attempts to continue operati...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
ICIP
1999
IEEE
16 years 18 days ago
A Model-Based Approach for Compression of Fingerprint Images
We proposea new ngerprint imagecompressionscheme based on the hybrid model of image. Our scheme uses the essential steps of a typical automated ngerprint identi cation system (AFI...
Fikret Erçal, Ilker Ersoy, Muhittin Gö...
TIM
2011
172views more  TIM 2011»
14 years 6 months ago
Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
—High-resolution automated fingerprint recognition systems (AFRSs) offer higher security because they are able to make use of level-3 features, such as pores, that are not avail...
David Zhang, Feng Liu, Qijun Zhao, Guangming Lu, N...
AAAI
2006
15 years 13 days ago
When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomalybased...
Denver Dash, Branislav Kveton, John Mark Agosta, E...