Sciweavers

3785 search results - page 171 / 757
» Immune System Based Intrusion Detection System
Sort
View
DIMVA
2009
15 years 6 months ago
Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications
We demonstrate that the browser implementation used at a host can be passively identified with significant precision and recall, using only coarse summaries of web traffic to and f...
Ting-Fang Yen, Xin Huang, Fabian Monrose, Michael ...
ICCV
2003
IEEE
15 years 10 months ago
An automatic drowning detection surveillance system for challenging outdoor pool environments
Automatically understanding events happening at a site is the ultimate goal of visual surveillance system. This paper investigates the challenges faced by automated surveillance s...
How-Lung Eng, Kar-Ann Toh, Alvin Harvey Kam, Junxi...
SAC
2009
ACM
15 years 11 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
BMCBI
2007
103views more  BMCBI 2007»
15 years 4 months ago
Systems biology approach for mapping the response of human urothelial cells to infection by Enterococcus faecalis
Background: To better understand the response of urinary epithelial (urothelial) cells to Enterococcus faecalis, a uropathogen that exhibits resistance to multiple antibiotics, a ...
Mikhail G. Dozmorov, Kimberly D. Kyker, Ricardo Sa...
VTC
2007
IEEE
128views Communications» more  VTC 2007»
15 years 11 months ago
Performance of Space-Code-Division Multiple-Access Systems Using Reduced-Rank Detection
Abstract—In this contribution the performance of multipleinput multiple-output space-division, code-division multipleaccess (MIMO SCDMA) is investigated, when the low-complexity ...
Jiliang Zhang, Lie-Liang Yang