Sciweavers

551 search results - page 47 / 111
» Preventing existence
Sort
View
DIMVA
2007
15 years 1 months ago
Characterizing Dark DNS Behavior
Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection....
Jon Oberheide, Manish Karir, Zhuoqing Morley Mao
GLOBECOM
2006
IEEE
15 years 6 months ago
On the Effectiveness of Service Registration-Based Worm Defense
— Existing Internet worm research focuses either on worm detection inside an AS, or on prevention of Internet-wide worm epidemic. But of more practical concern is how to repel wo...
Jin-Ho Kim, Hyogon Kim, Saewoong Bahk
AUSAI
2001
Springer
15 years 3 months ago
Fast Text Classification Using Sequential Sampling Processes
A central problem in information retrieval is the automated classification of text documents. While many existing methods achieve good levels of performance, they generally require...
Michael D. Lee
JSAC
2007
93views more  JSAC 2007»
14 years 11 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...
ICASSP
2011
IEEE
14 years 3 months ago
Horror video scene recognition via Multiple-Instance learning
Along with the ever-growing Web comes the proliferation of objectionable content, such as pornography, violence, horror information, etc. Horror videos, whose threat to childrens ...
Jianchao Wang, Bing Li, Weiming Hu, Ou Wu