Sciweavers

205 search results - page 26 / 41
» Detecting algorithmically generated malicious domain names
Sort
View
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
15 years 4 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
306
Voted
ICDE
2003
IEEE
247views Database» more  ICDE 2003»
16 years 1 months ago
CLUSEQ: Efficient and Effective Sequence Clustering
Analyzing sequence data has become increasingly important recently in the area of biological sequences, text documents, web access logs, etc. In this paper, we investigate the pro...
Jiong Yang, Wei Wang 0010
SAC
2009
ACM
15 years 6 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
IH
1998
Springer
15 years 4 months ago
Secure Copyright Protection Techniques for Digital Images
This paper2 presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images ...
Alexander Herrigel, Joseph Ó Ruanaidh, Holg...
CVPR
2012
IEEE
13 years 2 months ago
Discovering localized attributes for fine-grained recognition
Attributes are visual concepts that can be detected by machines, understood by humans, and shared across categories. They are particularly useful for fine-grained domains where c...
Kun Duan, Devi Parikh, David J. Crandall, Kristen ...