Sciweavers

1652 search results - page 228 / 331
» Matching Vector Codes
Sort
View
MEDIAFORENSICS
2010
15 years 26 days ago
Alignment and bit extraction for secure fingerprint biometrics
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure bio...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
OSDI
2008
ACM
15 years 11 months ago
SQCK: A Declarative File System Checker
The lowly state of the art for file system checking and repair does not match what is needed to keep important data available for users. Current file system checkers, such as e2fs...
Haryadi S. Gunawi, Abhishek Rajimwale, Andrea C. A...
SP
2005
IEEE
100views Security Privacy» more  SP 2005»
15 years 5 months ago
Polygraph: Automatically Generating Signatures for Polymorphic Worms
It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt....
James Newsome, Brad Karp, Dawn Xiaodong Song
ICSE
2010
IEEE-ACM
15 years 4 months ago
Developers ask reachability questions
A reachability question is a search across feasible paths through a program for target statements matching search criteria. In three separate studies, we found that reachability q...
Thomas D. LaToza, Brad A. Myers
CIS
2009
Springer
15 years 3 months ago
A Hierarchical Artificial Immune Model for Virus Detection
Abstract-- As viruses become more complex, existing antivirus methods are inefficient to detect various forms of viruses, especially new variants and unknown viruses. Inspired by i...
Wei Wang, Pengtao Zhang, Ying Tan, Xingui He