Sciweavers

8177 search results - page 220 / 1636
» Detecting System Emulators
Sort
View
99
Voted
IVC
2000
173views more  IVC 2000»
15 years 17 days ago
A computational approach to color adaptation effects
The human vision system has adaptation mechanisms that cannot be managed with the classic tri-stimulus color theory. The effects of these mechanisms are clearly visible in some we...
Daniele Marini, Alessandro Rizzi
131
Voted
SIGMETRICS
2012
ACM
267views Hardware» more  SIGMETRICS 2012»
13 years 3 months ago
Smartphones vs. laptops: comparing web browsing behavior and the implications for caching
In this work we present the differences and similarities of the web browsing behavior in most common mobile platforms. We devise a novel Operating System (OS) fingerprinting met...
Ioannis Papapanagiotou, Erich M. Nahum, Vasileios ...
CCR
2004
94views more  CCR 2004»
15 years 19 days ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Christian Kreibich, Jon Crowcroft
IPCCC
2007
IEEE
15 years 7 months ago
Optimising Networks Against Malware
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solutions that have been proposed to counter this threat are based on our ability ...
Pierre-Marc Bureau, José M. Fernandez
103
Voted
NDSS
2006
IEEE
15 years 6 months ago
Software Self-Healing Using Collaborative Application Communities
Software monocultures are usually considered dangerous because their size and uniformity represent the potential for costly and widespread damage. The emerging concept of collabor...
Michael E. Locasto, Stelios Sidiroglou, Angelos D....