The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fingerprint recognition of network equipment is closely related to network security. Router equipment, as one of the critical device in network, is the key object of study on the recognition of network equipment. Due to the biggest market shares of Cisco routers, which dominate the data exchange of internet, it's significant to study the recognition of Cisco routers for safeguarding network security...
In this paper, we present a real-time face recognition system for home security service robot which can be applied to recognize the person's face in front and give a warning when the identity of the person is a stranger. Considering the complexity of the actual situation, there might be some errors causing by the following factors like the angle, the size, the environment and the illumination of the...
Given the security threats of JavaScript malicious codes attacks in the Internet environment, this paper presents a method that uses the Naive Bayes classification to analyze JavaScript malicious codes. The method uses many malicious and normal sample data, and trains the classifier using extended API symbol features with a high degree of predictability of malicious codes, which contain variable names,...
In seas security supervision, we should conduct feature extraction and match for consecutive frames in order to effectively reduce the jitter caused by wind-induced vibration. Harris corner point detection algorithm is widely used in feature extraction for images. An improved algorithm for Harris corner detection is proposed in this paper since the feature points of images with large size, high pixel...
CAPTCHA is a new kind of network security mechanism. Studying the recognition of CAPTCHA can help to discover its hidden defects and thus make it more secure. For closely-connected CAPTCHAs that can hardly be recognized by methods of state of art, this paper proposed a new recognition algorithm based on holistic verification. During the process of this algorithm, Recurrent Neural Network (RNN) was...
Traditional anti-virus scanner employs static features to detect malicious executables. Unfortunately, this content-based approach can be obfuscated by techniques such as polymorphism and metamorphism. In this paper, we propose a malicious executable detecting method using 35-dimension feature vector. Each dimension stands for a malicious run-time behavior feature represented by corresponding Win32...
By using of chaotic map and block-wise independent technology, a new chaotic fragile watermarking algorithm is proposed in this paper. Firstly, location key is looked as logistic chaotic initial value to iterate and create location matrix, according to this matrix we can generate mapping image and identify the embedding location of watermarking in image blocks. Then watermarking sequence related with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.