Sciweavers

74 search results - page 6 / 15
» Automated Worm Fingerprinting
Sort
View
WORM
2004
14 years 11 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong
63
Voted
ICPR
2006
IEEE
15 years 10 months ago
Pores and Ridges: Fingerprint Matching Using Level 3 Features
Fingerprint friction ridge details are generally described in a hierarchical order at three levels, namely, Level 1 (pattern), Level 2 (minutiae points) and Level 3 (pores and rid...
Anil K. Jain, Meltem Demirkus, Yi Chen
ISBI
2007
IEEE
15 years 3 months ago
Automated Tracking of Multiple C. Elegans with Articulated Models
We present a method for tracking and distinguishing multiple C. elegans in a video sequence, including when they are in physical contact with one another. The worms are modeled wi...
Kuang-Man Huang, Pamela C. Cosman, William R. Scha...
DAC
1999
ACM
15 years 10 months ago
Effective Iterative Techniques for Fingerprinting Design IP
While previous watermarking-based approaches to intellectual property protection (IPP) have asymmetrically emphasized the IP provider's rights, the true goal of IPP is to ens...
Andrew E. Caldwell, Hyun-Jin Choi, Andrew B. Kahng...
CN
2007
90views more  CN 2007»
14 years 9 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos