Sciweavers

2269 search results - page 172 / 454
» Behavioral Intrusion Detection
Sort
View
CSREASAM
2006
15 years 6 months ago
Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs)
Wireless ad-hoc networks do not rely on a pre-existing network structure and are characterized by dynamic changes in the topology. This characteristic makes it difficult to perform...
Rajasekhar Yakkali, Gregory Vert
DAC
1999
ACM
16 years 5 months ago
Behavioral Synthesis Techniques for Intellectual Property Protection
? The economic viability of the reusable core-based design paradigm depends on the development of techniques for intellectual property protection. We introduce the first dynamic wa...
Inki Hong, Miodrag Potkonjak
IAW
2003
IEEE
15 years 10 months ago
Static Verification of Worm and virus Behavior in binary Executables using Model Checking
- Use offormal methods in any application scenario requires a precise characterization and representation of the properties that need to be verified The target, which is desired ri...
Prabhat K. Singh, Arun Lakhotia
UIST
2005
ACM
15 years 10 months ago
Physical embodiments for mobile communication agents
This paper describes a physically embodied and animated user interface to an interactive call handling agent, consisting of a small wireless animatronic device in the form of a sq...
Stefan Marti, Chris Schmandt
ICIP
2006
IEEE
16 years 6 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao