Sciweavers

205 search results - page 20 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
15 years 4 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
TRIDENTCOM
2008
IEEE
15 years 6 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
KDD
2002
ACM
286views Data Mining» more  KDD 2002»
16 years 5 days ago
Object Boundary Detection For Ontology-Based Image Classification
Technology in the field of digital media generates huge amounts of non-textual information, audio, video, and images, along with more familiar textual information. The potential f...
Lei Wang, Latifur Khan, Casey Breen
ICIP
2003
IEEE
16 years 1 months ago
Image fusion with the Hermite transform
The Hermite Transform is an image representation model that incorporates some important properties of visual perception such as the analysis through overlapping receptive fields a...
A. Lopez-Caloca, Boris Escalante-Ramírez
ICPR
2008
IEEE
15 years 6 months ago
Stop word detection in compressed textual images: An experiment on indic script documents
Stop word detection is attempted in this work in the context of retrieval of document images in the compressed domain. Algorithms are presented to identify text lines and words an...
Utpal Garain, Amit Kumar Das