Sciweavers

8177 search results - page 289 / 1636
» Detecting System Emulators
Sort
View
IH
2009
Springer
15 years 10 months ago
Detect Digital Image Splicing with Visual Cues
Image splicing detection has been considered as one of the most challenging problems in passive image authentication. In this paper, we propose an automatic detection framework to ...
Zhenhua Qu, Guoping Qiu, Jiwu Huang
105
Voted
HICSS
2008
IEEE
115views Biometrics» more  HICSS 2008»
15 years 9 months ago
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
This paper introduces capabilities developed for a Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts when abnormal current changes are detect...
Timothy Buennemeyer, Theresa M. Nelson, Lee M. Cla...
DATE
2010
IEEE
188views Hardware» more  DATE 2010»
15 years 8 months ago
Power-accuracy tradeoffs in human activity transition detection
— Wearable, mobile computing platforms are envisioned to be used in out-patient monitoring and care. These systems continuously perform signal filtering, transformations, and cla...
Jeffrey Boyd, Hari Sundaram, Aviral Shrivastava
131
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
NAACL
2004
15 years 4 months ago
Multiple Similarity Measures and Source-Pair Information in Story Link Detection
State-of-the-art story link detection systems, that is, systems that determine whether two stories are about the same event or linked, are usually based on the cosine-similarity m...
Francine Chen, Ayman Farahat, Thorsten Brants