Sciweavers

2269 search results - page 287 / 454
» Behavioral Intrusion Detection
Sort
View
ACSAC
2008
IEEE
15 years 11 months ago
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
We propose STILL, a generic defense based on Static Taint and InitiaLization anaLyses, to detect exploit code embedded in data streams/requests targeting at various Internet servi...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
ICIP
2008
IEEE
15 years 11 months ago
Motion detection with an unstable camera
Fast and accurate motion detection in the presence of camera jitter is known to be a difficult problem. Existing statistical methods often produce abundant false positives since ...
Pierre-Marc Jodoin, Janusz Konrad, Venkatesh Salig...
151
Voted
ICC
2007
IEEE
170views Communications» more  ICC 2007»
15 years 11 months ago
A Post-Detection SNR-Aided Timing Recovery Loop for MIMO-OFDM Receivers
--- In this paper, a novel third-order Phase Lock Loop (PLL) is proposed for the timing recovery in MIMO-OFDM systems. It differentiates from conventional timing recovery algorithm...
Wenzhen Li, Masayuki Tomisawa
RAID
2007
Springer
15 years 11 months ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
15 years 11 months ago
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...