Sciweavers

8177 search results - page 220 / 1636
» Detecting System Emulators
Sort
View
IVC
2000
173views more  IVC 2000»
15 years 2 months ago
A computational approach to color adaptation effects
The human vision system has adaptation mechanisms that cannot be managed with the classic tri-stimulus color theory. The effects of these mechanisms are clearly visible in some we...
Daniele Marini, Alessandro Rizzi
SIGMETRICS
2012
ACM
267views Hardware» more  SIGMETRICS 2012»
13 years 5 months ago
Smartphones vs. laptops: comparing web browsing behavior and the implications for caching
In this work we present the differences and similarities of the web browsing behavior in most common mobile platforms. We devise a novel Operating System (OS) fingerprinting met...
Ioannis Papapanagiotou, Erich M. Nahum, Vasileios ...
CCR
2004
94views more  CCR 2004»
15 years 2 months ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Christian Kreibich, Jon Crowcroft
IPCCC
2007
IEEE
15 years 9 months ago
Optimising Networks Against Malware
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
Pierre-Marc Bureau, José M. Fernandez
NDSS
2006
IEEE
15 years 9 months ago
Software Self-Healing Using Collaborative Application Communities
Software monocultures are usually considered dangerous because their size and uniformity represent the potential for costly and widespread damage. The emerging concept of collabor...
Michael E. Locasto, Stelios Sidiroglou, Angelos D....