Sciweavers

2139 search results - page 247 / 428
» Connecting language to the world
Sort
View
DIMVA
2010
15 years 8 days ago
HProxy: Client-Side Detection of SSL Stripping Attacks
Abstract. In today's world wide web hundreds of thousands of companies use SSL to protect their customers' transactions from potential eavesdroppers. Recently, a new atta...
Nick Nikiforakis, Yves Younan, Wouter Joosen
CVPR
2008
IEEE
14 years 11 months ago
Joint multi-label multi-instance learning for image classification
In real world, an image is usually associated with multiple labels which are characterized by different regions in the image. Thus image classification is naturally posed as both ...
Zheng-Jun Zha, Xian-Sheng Hua, Tao Mei, Jingdong W...
IAT
2008
IEEE
14 years 11 months ago
Planning with iFALCON: Towards A Neural-Network-Based BDI Agent Architecture
This paper presents iFALCON, a model of BDI (beliefdesire-intention) agents that is fully realized as a selforganizing neural network architecture. Based on multichannel network m...
Budhitama Subagdja, Ah-Hwee Tan
COMPSEC
2010
93views more  COMPSEC 2010»
14 years 11 months ago
Roving bugnet: Distributed surveillance threat and mitigation
Abstract Advanced mobile devices such as laptops and smartphones make convenient hiding places for surveillance spyware. They commonly have a microphone and camera built-in, are in...
Ryan Farley, Xinyuan Wang

Publication
96views
14 years 11 months ago
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks
BitTorrent is currently one of the most popular peer-to-peer systems. BitTorrent clients are widely spread all over the world and account for a large fraction of today’s Internet...
Karim El Defrawy, Minas Gjoka, Athina Markopoulou