Sciweavers

2236 search results - page 116 / 448
» Intrusion detection techniques and approaches
Sort
View
ICIP
2002
IEEE
15 years 11 months ago
A blind watermarking technique in JPEG compressed domain
We proposed a blind watermarking technique to embed the watermark in JPEG compressed domain. Low frequency DCT coefficients are extracted to form an M-dimensional vector. Watermar...
Oscar C. Au, Peter H. W. Wong
ICPR
2008
IEEE
15 years 4 months ago
Background subtraction technique based on chromaticity and intensity patterns
This paper presents an efficient Real-Time method for detecting moving objects in unconstrained environments, using a background subtraction technique. A new background model that...
Ariel Amato, Mikhail Mozerov, Ivan Huerta Casado, ...
ICISS
2007
Springer
15 years 1 months ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...
95
Voted
IPPS
2008
IEEE
15 years 4 months ago
A modeling approach for estimating execution time of long-running scientific applications
In a Grid computing environment, resources are shared among a large number of applications. Brokers and schedulers find matching resources and schedule the execution of the applic...
Seyed Masoud Sadjadi, Shu Shimizu, Javier Figueroa...
SWAP
2008
14 years 11 months ago
Combining Statistical Techniques and Lexico-syntactic Patterns for Semantic Relations Extraction from Text
We describe here a methodology to combine two different techniques for Semantic Relation Extraction from texts. On the one hand, generic lexicosyntactic patterns are applied to the...
Emiliano Giovannetti, Simone Marchi, Simonetta Mon...