Sciweavers

20 search results - page 2 / 4
» Applications of Hidden Markov Models to Detecting Multi-Stag...
Sort
View
ETRICS
2006
13 years 8 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
ICC
2009
IEEE
125views Communications» more  ICC 2009»
13 years 2 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
DSN
2006
IEEE
13 years 8 months ago
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks
Distributed sensor networks are highly prone to accidental errors and malicious activities, owing to their limited resources and tight interaction with the environment. Yet only a...
Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, ...
ICANN
2007
Springer
13 years 11 months ago
An Application of Recurrent Neural Networks to Discriminative Keyword Spotting
Abstract. Keyword spotting is a detection task consisting in discovering the presence of specific spoken words in unconstrained speech. The majority of keyword spotting systems ar...
Santiago Fernández, Alex Graves, Jürge...
LOCA
2007
Springer
13 years 11 months ago
SocialMotion: Measuring the Hidden Social Life of a Building
In this paper we present an approach to analyzing the social behaviors that occur in a typical office space. We describe a system consisting of over 200 motion sensors connected ...
Christopher Richard Wren, Yuri A. Ivanov, Ishwinde...