Sciweavers

326 search results - page 16 / 66
» Testing malware detectors
Sort
View
MDM
2010
Springer
164views Communications» more  MDM 2010»
15 years 8 days ago
A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation
—Context-awareness is a critical aspect of safe navigation, especially for the blind and visually-impaired in unfamiliar environments. Existing mobile devices for contextaware na...
Pelin Angin, Bharat K. Bhargava, Sumi Helal
130
Voted
ICPR
2002
IEEE
15 years 6 months ago
Parzen-Window Network Intrusion Detectors
Network intrusion detection is the problem of detecting anomalous network connections caused by intrusive activities. Many intrusion detection systems proposed before use both nor...
Dit-Yan Yeung, Calvin Chow
137
Voted
HAIS
2010
Springer
15 years 6 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
ASPLOS
2006
ACM
15 years 5 months ago
Accurate and efficient filtering for the Intel thread checker race detector
Debugging data races in parallel applications is a difficult task. Error-causing data races may appear to vanish due to changes in an application's optimization level, thread...
Paul Sack, Brian E. Bliss, Zhiqiang Ma, Paul Peter...
123
Voted
DSP
2006
15 years 1 months ago
Detection of audio covert channels using statistical footprints of hidden messages
We address the problem of detecting the presence of hidden messages in audio. The detector is based on the characteristics of the denoised residuals of the audio file, which may c...
Hamza Özer, Bülent Sankur, Nasir D. Memo...