Sciweavers

415 search results - page 2 / 83
» Intruders pattern identification
Sort
View
ICPR
2010
IEEE
13 years 4 months ago
Wavelet Domain Local Binary Pattern Features For Writer Identification
The representation of writing styles is a crucial step of writer identification schemes. However, the large intra-writer variance makes it a challenging task. Thus, a good feature...
Liang Du, Xinge You, Huihui Xu, Zhifan Gao, Yuan Y...
ADHOC
2008
132views more  ADHOC 2008»
13 years 6 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
JCP
2007
132views more  JCP 2007»
13 years 6 months ago
A Theoretical Framework for Organizational Network Forensic Readiness
This paper discusses breaking the escalation cycle that locks cyber intruders and their targets in a state where targets are perennially resigned to attacks and intruders are at...
Barbara Endicott-Popovsky, Deborah A. Frincke, Car...
ANSS
2004
IEEE
13 years 10 months ago
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Dongxi Liu, Chi-Hung Chi, Ming Li
VL
1994
IEEE
164views Visual Languages» more  VL 1994»
13 years 10 months ago
Similarity Patterns in Language
Dotplot is a technique for visualizing patterns of string matches in millions of lines of text and code. Patterns may be explored interactively or detected automatically. Applicat...
Jonathan Helfman