Sciweavers

619 search results - page 4 / 124
» Coalition detection and identification
Sort
View
GLOBECOM
2009
IEEE
13 years 10 months ago
Anomaly-Based Identification of Large-Scale Attacks
Abstract--Large-scale attacks like Distributed Denial-ofService (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based business. Thus, ma...
Thomas Gamer
HICSS
2005
IEEE
134views Biometrics» more  HICSS 2005»
13 years 11 months ago
An Approach for Intent Identification by Building on Deception Detection
Past research in deception detection at the University of Arizona has guided the investigation of intent detection. A theoretical foundation and model for the analysis of intent d...
Judee K. Burgoon, Mark Adkins, John Kruse, Matthew...
PAMI
2012
11 years 8 months ago
Altered Fingerprints: Analysis and Detection
—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that the...
Soweon Yoon, Jianjiang Feng, Anil K. Jain
CLEF
2010
Springer
13 years 7 months ago
External Plagiarism Detection: N-Gram Approach Using Named Entity Recognizer - Lab Report for PAN at CLEF 2010
We tried Named Entity features of source documents to identify its suspicious counter part. A three stage identification method was adopted to understand the impact of NEs in plagi...
Parth Gupta, Sameer Rao, Prasenjit Majumder
ICMLA
2004
13 years 7 months ago
Outlier detection and evaluation by network flow
Detecting outliers is an important topic in data mining. Sometimes the outliers are more interesting than the rest of the data. Outlier identification has lots of applications, su...
Ying Liu, Alan P. Sprague