Sciweavers

349 search results - page 55 / 70
» Computer Security Research: Approaches and Assumptions
Sort
View
98
Voted
PAMI
2011
14 years 8 days ago
Silhouette Segmentation in Multiple Views
— In this paper, we present a method for extracting consistent foreground regions when multiple views of a scene are available. We propose a framework that automatically identiï¬...
Wonwoo Lee, Woontack Woo, Edmond Boyer
EUSAI
2004
Springer
15 years 1 months ago
Distance-Based Access Modifiers Applied to Safety in Home Networks
Home networks and the interconnection of home appliances is a classical theme in ubiquitous computing research. Security is a recurring concern, but there is a lack of awareness of...
Kjeld Høyer Mortensen, Kari R. Schougaard, ...
OSDI
2008
ACM
15 years 9 months ago
SALSA: Analyzing Logs as StAte Machines
SALSA examines system logs to derive state-machine views of the sytem's execution, along with control-flow, data-flow models and related statistics. Exploiting SALSA's d...
Jiaqi Tan, Xinghao Pan, Soila Kavulya, Rajeev Gand...
ICSE
2008
IEEE-ACM
15 years 9 months ago
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...
98
Voted
PERCOM
2009
ACM
15 years 4 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...