Sciweavers

1548 search results - page 88 / 310
» Estimating Software Vulnerabilities
Sort
View
ICASSP
2008
IEEE
15 years 5 months ago
Robust speaker identification using combined feature selection and missing data recognition
Missing data techniques have been recently applied to speaker recognition to increase performance in noisy environments. The drawback of these techniques is the vulnerability of t...
Daniel Pullella, Marco Kühne, Roberto Togneri
ICIAR
2005
Springer
15 years 4 months ago
A Steganographic Method for Digital Images Robust to RS Steganalysis
Digital images are increasingly being used as steganographic covers for secret communication. The Least Significant Bit (LSB) encoding is one of the most widely used methods for e...
André R. S. Marçal, Patricia R. Pere...
PET
2005
Springer
15 years 4 months ago
Message Splitting Against the Partial Adversary
We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
Andrei Serjantov, Steven J. Murdoch
JDFP
2006
109views more  JDFP 2006»
14 years 11 months ago
Warkitting: The Drive-by Subversion of Wireless Home Routers
In this paper we introduce the notion of warkitting as the drive-by subversion of wireless home routers through unauthorized access by mobile WiFi clients. We describe how such at...
Alex Tsow, Markus Jakobsson, Liu Yang, Susanne Wet...
ICDE
2007
IEEE
96views Database» more  ICDE 2007»
15 years 3 months ago
Mining Software Data
Data mining techniques and machine learning methods are commonly used in several disciplines. It is possible that they could also provide a basis for quality assessment of softwar...
Burak Turhan, F. Onur Kutlubay