Sciweavers

201 search results - page 39 / 41
» Active learning for network intrusion detection
Sort
View
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 6 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
RAID
2009
Springer
14 years 5 days ago
VirusMeter: Preventing Your Cellphone from Spies
Due to the rapid advancement of mobile communication technology, mobile devices nowadays can support a variety of data services that are not traditionally available. With the growi...
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen
INFOCOM
2012
IEEE
11 years 8 months ago
Di-Sec: A distributed security framework for heterogeneous Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are no longer a nascent technology and today, they are actively deployed as a viable technology in many diverse application domains such as health ...
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Y...
ICCV
2009
IEEE
6637views Computer Vision» more  ICCV 2009»
14 years 10 months ago
A Markov Clustering Topic Model for Mining Behaviour in Video
This paper addresses the problem of fully automated mining of public space video data. A novel Markov Clustering Topic Model (MCTM) is introduced which builds on existing Dynami...
Timothy Hospedales, Shaogang Gong, Tao Xiang
WISE
2006
Springer
13 years 11 months ago
Finding Reliable Recommendations for Trust Model
This paper presents a novel context-based approach to find reliable recommendations for trust model in ubiquitous environments. Context is used in our approach to analyze the userâ...
Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Ko...