Sciweavers

988 search results - page 29 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ICDE
2005
IEEE
183views Database» more  ICDE 2005»
15 years 5 months ago
Protection of Location Privacy using Dummies for Location-based Services
Recently, highly accurate positioning devices enable us to provide various types of location-based services. On the other hand, because position data obtained by such devices incl...
Hidetoshi Kido, Yutaka Yanagisawa, Tetsuji Satoh
GLOBECOM
2007
IEEE
15 years 6 months ago
A Technique to Enhance Localization in the Presence of NLOS Errors
— In a wireless network (WN), the wireless devices generally localize themselves with the help of anchors that are pre-deployed in the network. Some of the techniques commonly us...
Satyajayant Misra, Weiyi Zhang, Guoliang Xue
TDSC
2010
191views more  TDSC 2010»
14 years 10 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
PR
2008
140views more  PR 2008»
14 years 11 months ago
An incremental node embedding technique for error correcting output codes
The error correcting output codes (ECOC) technique is a useful way to extend any binary classifier to the multiclass case. The design of an ECOC matrix usually considers an a prio...
Oriol Pujol, Sergio Escalera, Petia Radeva
CCS
2010
ACM
14 years 12 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...