Learn More
The need to keep an attacker oblivious of an attack mitigation effort is a very important component of a defense against denial of services (DoS) and distributed denial of services (DDoS) attacks because it helps to dissuade attackers from changing their attack patterns. Conceptually, DDoS mitigation can be achieved by two components. The first is a decoy(More)
Camera pose estimation under dynamic intrinsic parameter change for augmented reality, Computers & Graphics, This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the(More)
Threat detection and analysis are indispensable processes in today's cyberspace, but current state of the art threat detection is still limited to specific aspects of modern malicious activities due to the lack of information to analyze. By measuring and collecting various types of data, from traffic information to human behavior, at different vantage(More)
The development of wireless technologies, such as 3G and Wi-Fi, and the rapid growth of mobile devices equipped with sensors have enabled the practical use of Mobile Participatory Sensing (MPS). By gathering and utilizing sensor data using mobile devices, the deployment cost of services can be reduced. In the context of MPS, it is important to establish a(More)
Application layer Distributed Denial of Service (DDoS) attacks are among the deadliest kinds of attacks that have significant impact on destination servers and networks due to their ability to be launched with minimal computational resources to cause an effect of high magnitude. Commercial and government Web servers have become the primary target of these(More)
HTTPS websites are often considered safe by the users, due to the use of the SSL/TLS protocol. As a consequence phishing web pages delivered via this protocol benefit from that higher level of trust as well. In this paper, we assessed the relevance of heuristics such as the certificate information, the SSL/TLS protocol version and cipher-suite chosen by the(More)
Service chaining is an emerging architecture from the trend of Software Defined Networking and Network Functions Virtualization. This architecture is expected to improve network flexibility and reduce equipment and operational costs. However, recent approaches for service chaining require new networking technologies that need to be standardized, implemented(More)
In general, video see-through based augmented reality (AR) cannot change the magnification of camera zooming parameter due to the difficulty of dealing with changes in intrinsic camera parameters. To realize the usage of camera zooming in AR, we propose a novel simultaneous intrinsic and extrinsic camera parameter estimation method based on an energy(More)