Sciweavers

8177 search results - page 454 / 1636
» Detecting System Emulators
Sort
View
WIMOB
2008
IEEE
15 years 11 months ago
VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking
—Recently, mobile social software has become an active area of research and development. A multitude of systems have been proposed over the past years that try to follow the succ...
Marco von Arb, Matthias Bader, Michael Kuhn 0002, ...
ICC
2007
IEEE
170views Communications» more  ICC 2007»
15 years 10 months ago
A Post-Detection SNR-Aided Timing Recovery Loop for MIMO-OFDM Receivers
--- In this paper, a novel third-order Phase Lock Loop (PLL) is proposed for the timing recovery in MIMO-OFDM systems. It differentiates from conventional timing recovery algorithm...
Wenzhen Li, Masayuki Tomisawa
SMC
2007
IEEE
130views Control Systems» more  SMC 2007»
15 years 10 months ago
A flow based approach for SSH traffic detection
— The basic objective of this work is to assess the utility of two supervised learning algorithms AdaBoost and RIPPER for classifying SSH traffic from log files without using f...
Riyad Alshammari, A. Nur Zincir-Heywood
ICMCS
2006
IEEE
138views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Detecting Malicious Hosts in the Presence of Lying Hosts in Peer-to-Peer Streaming
Current peer-to-peer (P2P) streaming systems often assume that hosts are cooperative. However, this may not be true in the open environment of the Internet. In this paper, we disc...
Xing Jin, S.-H. Gary Chan, Wai-Pun Ken Yiu, Yongqi...
DSN
2005
IEEE
15 years 10 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...