Sciweavers

83 search results - page 9 / 17
» Image-Based Anomaly Detection Technique: Algorithm, Implemen...
Sort
View
DAC
2001
ACM
15 years 11 months ago
Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers
: Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concu...
Ramesh Karri, Kaijie Wu, Piyush Mishra, Yongkook K...
ICST
2008
IEEE
15 years 4 months ago
Automated Session Data Repair for Web Application Regression Testing
This paper introduces an approach to web application regression testing, based upon repair of user session data. The approach is entirely automated. It consists of a white box exa...
Mark Harman, Nadia Alshahwan
PLDI
2009
ACM
15 years 4 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
ICIP
2008
IEEE
15 years 11 months ago
Blind forensics of contrast enhancement in digital images
Digital images have seen increased use in applications where their authenticity is of prime importance. This proves to be problematic due to the widespread availability of digital...
Matthew Stamm, K. J. Ray Liu
AAAI
2008
15 years 11 days ago
An Effective and Robust Method for Short Text Classification
Classification of texts potentially containing a complex and specific terminology requires the use of learning methods that do not rely on extensive feature engineering. In this w...
Victoria Bobicev, Marina Sokolova