As the obfuscation is widely used by malware writers to evade antivirus scanners, so it becomes important to analyze how this technique is applied to malwares. This paper explores ...
In recent years, local pattern based object detection and recognition have attracted increasing interest in computer vision research community. However, to our best knowledge no p...
Yadong Mu, Shuicheng Yan, Yi Liu, Thomas S. Huang,...
We review a memory-based buffer model of visual perception, that combines the lower and middle stages in the analysis of video. This model was originally developed for the detecti...
In this paper we present a review of recent advances in the field of ultra-sensitive imagers with ultra fast detection capability. Photon counting capability in these sensors is ge...
We propose a characterization of distributed denial of service (DDOS) defenses where reaction points are network-based and attack responses are active. The purpose is to provide a ...
Li-Chiou Chen, Thomas A. Longstaff, Kathleen M. Ca...