Sciweavers

272 search results - page 22 / 55
» Detecting Altered Fingerprints
Sort
View
CORR
2010
Springer
136views Education» more  CORR 2010»
15 years 14 days ago
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of leg...
Kenton Born, David Gustafson
IJNSEC
2010
141views more  IJNSEC 2010»
14 years 8 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
IWANN
2009
Springer
15 years 8 months ago
Bayesian Joint Estimation of CN and LOH Aberrations
SNP-microarrays are able to measure simultaneously both copy number and genotype at several single nucleotide polymorphism positions. Combining the two data, it is possible to bett...
Paola M. V. Rancoita, Marcus Hutter, Francesco Ber...
DMIN
2007
110views Data Mining» more  DMIN 2007»
15 years 3 months ago
Mining for Structural Anomalies in Graph-based Data
—In this paper we present graph-based approaches to mining for anomalies in domains where the anomalies consist of unexpected entity/relationship alterations that closely resembl...
William Eberle, Lawrence B. Holder
ICIP
2006
IEEE
16 years 3 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao