|
|
|
Betty Saridou, Isidoros Moulas, Stavros Shiaeles and Basil Papadopoulos
Image conversion of malicious binaries, or binary visualisation, is a relevant approach in the security community. Recently, it has exceeded the role of a single-file malware analysis tool and has become a part of Intrusion Detection Systems (IDSs) thank...
ver más
|
|
|
|
|
|
Barbara Cardone, Ferdinando Di Martino and Salvatore Sessa
This research proposes a new image compression method based on the F1-transform which improves the quality of the reconstructed image without increasing the coding/decoding CPU time. The advantage of compressing color images in the YUV space is due to th...
ver más
|
|
|
|
|
|
Xiao Chen, Mujiahui Yuan, Qi Yang, Haiyang Yao and Haiyan Wang
Underwater target detection using optical images is a challenging yet promising area that has witnessed significant progress. However, fuzzy distortions and irregular light absorption in the underwater environment often lead to image blur and color bias,...
ver más
|
|
|
|
|
|
Woochul Choi, Bongjoo Jang, Intaek Jung, Hongki Sung and Younmi Jang
Research related to thermal cameras, which are major control measures, is increasing to overcome the limitations of closed-circuit television (CCTV) images. Thermal cameras have the advantage of easily detecting objects at night and of being able to iden...
ver más
|
|
|
|
|
|
Cheng-Jian Lin, Min-Su Huang and Chin-Ling Lee
The applications of computer networks are increasingly extensive, and networks can be remotely controlled and monitored. Cyber hackers can exploit vulnerabilities and steal crucial data or conduct remote surveillance through malicious programs. The frequ...
ver más
|
|
|