Sciweavers

205 search results - page 14 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
120
Voted
ICDAR
1995
IEEE
15 years 1 months ago
A Hough based algorithm for extracting text lines in handwritten documents
The method herein proposed detects text lines on handwritten pages which may include either lines oriented in several directions, erasures, or annotationsbetween main lines. The m...
Laurence Likforman-Sulem, Anahid Hanimyan, Claudie...
FLAIRS
2000
14 years 11 months ago
What is Wrong with this Equation? Error Detection and Feedback with Physics Equations
Oneof the keys to a goodIntelligent Tutoring System (ITS)is its ability to identify andlocalize the error a student's answerand then generate useful feedback. This paper desc...
Chun Wai Liew, Joel A. Shapiro, Donald E. Smith
77
Voted
SRDS
2007
IEEE
15 years 3 months ago
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. ...
Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
ATAL
2003
Springer
15 years 2 months ago
Detecting deception in reputation management
We previously developed a social mechanism for distributed reputation management, in which an agent combines testimonies from several witnesses to determine its ratings of another...
Bin Yu, Munindar P. Singh
IAW
2003
IEEE
15 years 2 months ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...