Generally, the real-time applications exchange information on dedicated network and the other traffic is supported by another communication system. The differentiation of these tw...
Jean-Philippe Georges, Eric Rondeau, Thierry Divou...
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
This paper describes features and methods for document image comparison and classification at the spatial layout level. The methods are useful for visual similarity based document...
Jianying Hu, Ramanujan S. Kashi, Gordon T. Wilfong
This paper presents a detailed comparative study of 4 rotation invariant texture analysis methods. Human subjects are included as a benchmark for the computational methods. Experi...