Sciweavers

868 search results - page 88 / 174
» On Analog Signature Analysis
Sort
View
CIC
2004
14 years 11 months ago
On the Analysis of Packet-Train Probing Schemes
With a better understanding of how probe packets and cross-traffic packets interact with each other, more accurate measurement methods based on active probing can be developed. Sev...
Andreas Johnsson, Bob Melander, Mats Björkman
VIROLOGY
2010
162views more  VIROLOGY 2010»
14 years 8 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
JMLR
2010
185views more  JMLR 2010»
14 years 4 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
ICASSP
2009
IEEE
15 years 4 months ago
Relative pitch estimation of multiple instruments
We present an algorithm based on probabilistic latent component analysis and employ it for relative pitch estimation of multiple instruments in polyphonic music. A multilayered po...
Gautham J. Mysore, Paris Smaragdis
DATE
2005
IEEE
100views Hardware» more  DATE 2005»
15 years 3 months ago
DPA on Quasi Delay Insensitive Asynchronous Circuits: Formalization and Improvement
The purpose of this paper is to formally specify a flow devoted to the design of Differential Power Analysis (DPA) resistant QDI asynchronous circuits. The paper first proposes a ...
G. Fraidy Bouesse, Marc Renaudin, Sophie Dumont, F...