Current web application scanner reports contribute little to diagnosis and remediation when dealing with vulnerabilities that are related or vulnerability variants. We propose a quantitative framework that combines de...
详细信息
Current web application scanner reports contribute little to diagnosis and remediation when dealing with vulnerabilities that are related or vulnerability variants. We propose a quantitative framework that combines degree of confidence reports pre-computed from various scanners. The output is evaluated and mapped based on derived metrics to appropriate remediation for the detected vulnerabilities and vulnerability variants. The objective is to provide a trusted level of diagnosis and remediation that is appropriate. Examples based on commercial scanners and existing vulnerabilities and variants are used to demonstrate the framework's capability.
In order to detect the location of smoke in the Measuring System for Ground Shell Dispersion (MSGSD), presented an improved algorithm for the Background Subtraction. Focused on introducing design of the image detectio...
详细信息
In order to detect the location of smoke in the Measuring System for Ground Shell Dispersion (MSGSD), presented an improved algorithm for the Background Subtraction. Focused on introducing design of the image detection algorithm. The results show that the system can quickly, accurately and effectively detect the location of the smoke.
The introduction of Phase-Change Memory (PCM) as a main memory technology has great potential to achieve a large energy reduction. PCM has desirable energy and scalability properties, but its use for main memory also ...
详细信息
ISBN:
(纸本)9783981080162
The introduction of Phase-Change Memory (PCM) as a main memory technology has great potential to achieve a large energy reduction. PCM has desirable energy and scalability properties, but its use for main memory also poses challenges such as limited write endurance with at most 10 7 writes per bit cell before failure. This paper describes techniques to enhance the lifetime of PCM when used for main memory. Our techniques are (a) writeback minimization with new cache replacement policies, (b) avoidance of unnecessary writes, which write only the bit cells that are actually changed, and (c) endurance management with a novel PCM-aware swap algorithm for wear-leveling. A failure detection algorithm is also incorporated to improve the reliability of PCM. With these approaches, the lifetime of a PCM main memory is increased from just a few days to over 8 years.
A robust stitching algorithm of panorama is proposed to improve the efficiency and accuracy of constructing panorama. Firstly, pyramid based image is formed according to the input images, and then use the least local ...
详细信息
ISBN:
(纸本)9781424451623;9781424451616
A robust stitching algorithm of panorama is proposed to improve the efficiency and accuracy of constructing panorama. Firstly, pyramid based image is formed according to the input images, and then use the least local entropy and Sequential Similarity detection Algorithm with adaptive threshold to complete the stitching of the panoramic images . The experiments show that the method has the properties of anti-noise and anti-geometrical deformation. It indicates a high robustness to images taken by camera in common condition.
In this paper, we consider the problem of "evil twin" attacks in wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one ...
详细信息
In this paper, we consider the problem of "evil twin" attacks in wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on wireless communications of users' Internet access. Existing evil twin detection solutions are mostly for wireless network administrators to verify whether a given AP is in an authorized list or not, instead of for a wireless client to detect whether a given AP is authentic or evil. Such administrator-side solutions are limited, expensive, and not available for many scenarios. For example, for traveling users who use wireless networks at airports, hotels, or cafes, they need to protect themselves from evil twin attacks (instead of relying on those wireless network providers, which typically may not provide strong security monitoring/management service). Thus, a lightweight and effective solution for these users is highly desired. In this work, we propose a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects. Unlike previous approaches, our technique does not need a known authorized AP/host list, thus it is suitable for users to identify and avoid evil twins. Our technique does not strictly rely on training data of target wireless networks, nor depend on the types of wireless networks. We propose to exploit fundamental communication structures and properties of such evil twin attacks in wireless networks and to design new active, statistical and anomaly detection algorithms. "Our preliminary evaluation in real-world widely deployed 802.11b and 802.11g wireless networks shows very promising results. We can identify evil twins with a very high detection rate while keeping a very low false positive rate.
This paper describes a new data visualization method using a three-dimensional dendrogram to And the relationship between similar text documents. For the detection of similarities in documents, we introduce two basic ...
详细信息
ISBN:
(纸本)9781424476428
This paper describes a new data visualization method using a three-dimensional dendrogram to And the relationship between similar text documents. For the detection of similarities in documents, we introduce two basic evaluation functions, "LCS" and "SED." We constructed and developed the proposed algorithm in MATLAB language, and conducted a comparison measurement and examined the evaluations. The validity of the proposed method can be verified by applying actual documents to demonstrate the 3D visualization.
This paper presents a method to identify the edges and corners of clothes in an image using image processing methods. In clothes manipulation, it is important for the GUI program to identify the shape of clothes befor...
详细信息
This paper presents a method to identify the edges and corners of clothes in an image using image processing methods. In clothes manipulation, it is important for the GUI program to identify the shape of clothes before spreading and folding. The first step for clothes manipulation is that the robot needs to grab two real corners so the clothes can be spread easily. The computer vision system becomes an important part in finding the corner of clothes. With the help of image processing, the corner of clothes can be identified for the robot to spread and fold the clothes. This method to identify the corner of clothes in the image is by applying certain image processing methods. Some basic morphological operations are used to filter the image captured in order to reduce the noise and disturbance and also extract the essential data from the image for further processing. The purpose of using this method is to identify the pixel in the image which is potentially represented as a corner of the clothes and become a starting point for the robot in clothes manipulation.
Maneuvering target tracking methods mainly include maneuver detection algorithm and adaptive tracking algorithm. Maneuver detection and adaptive tracking algorithm has its own advantages and disadvantages. The standar...
详细信息
ISBN:
(纸本)9781424471645;9781424471638
Maneuvering target tracking methods mainly include maneuver detection algorithm and adaptive tracking algorithm. Maneuver detection and adaptive tracking algorithm has its own advantages and disadvantages. The standard multi-model adaptive Kalman filter exits divergence and poor maneuver adaptation. For the above shortcoming, a modification to the standard multi-model adaptive Kalman filter is done. Multi-model parallel Kalman filter based on maneuver detection is constructed. The probability of each model being true is computed and then the weighted sum is obtained. At the same time, different state noise covariance matrix Q in each model is used. The parameter Q will be adjusted, once the target maneuver is detected in the filtering process. The simulation results show that filtering convergence speed and filtering accuracy are both improved for multi-model parallel Kalman filter based on maneuver detection. So the method is effective to improve the maneuvering targets tracking performance.
This paper proposes an embedded surveillance system for real-time anomaly intrusion detection based on temporal difference algorithm and theft items detection based on accumulated background subtraction algorithm. Thi...
详细信息
ISBN:
(纸本)9781424458653
This paper proposes an embedded surveillance system for real-time anomaly intrusion detection based on temporal difference algorithm and theft items detection based on accumulated background subtraction algorithm. This design of modified vision algorithm fully utilize the advanced parallelism of Field Programmable Gate Arrays (FPGA) and this hardware implementation realizes time-consumed difference computing with on-chip FIFO and RAM memory. Finally, we fuse these two anomaly detection algorithms in one FPGA and select the algorithm type by user needs. As a result, the detecting validity and robustness of this implementation have been demonstrated through real-time surveillance videos.
暂无评论