Sciweavers

2236 search results - page 124 / 448
» Intrusion detection techniques and approaches
Sort
View
AIMS
2008
Springer
15 years 4 months ago
Towards Resilient Community Wireless Mesh Networks
Abstract. Wireless Mesh Networks are an increasingly common technology providing connectivity in many communities, particularly where Internet access is unavailable or restricted v...
Sara Bury, Nicholas J. P. Race
NDSS
2009
IEEE
15 years 4 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
CAIP
1999
Springer
15 years 2 months ago
Shift Detection by Restoration
In this paper an approach is presented for robust shift detection of two given images. The new unifying idea is that we determine a shifted delta impulse using some well-known res...
Herbert Süße, Klaus Voss, Wolfgang Ortm...
WCRE
2010
IEEE
14 years 8 months ago
From Whence It Came: Detecting Source Code Clones by Analyzing Assembler
To date, most clone detection techniques have concentrated on various forms of source code analysis, often by analyzing token streams. In this paper, we introduce a complementary ...
Ian J. Davis, Michael W. Godfrey
CORIA
2006
14 years 11 months ago
Unnatural language detection
In the context of web search engines, the escalation between ranking techniques and spamdexing techniques has led to the appearance of faked contents in web pages. If random sequen...
Thomas Lavergne