Sciweavers

21 search results - page 2 / 5
» Online Training of SVMs for Real-time Intrusion Detection
Sort
View
CONEXT
2007
ACM
13 years 7 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
ECCV
2004
Springer
14 years 7 months ago
Real-Time Tracking of Multiple Skin-Colored Objects with a Possibly Moving Camera
Abstract. This paper presents a method for tracking multiple skincolored objects in images acquired by a possibly moving camera. The proposed method encompasses a collection of tec...
Antonis A. Argyros, Manolis I. A. Lourakis
ICAI
2008
13 years 6 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
ICPR
2008
IEEE
13 years 11 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
CASES
2005
ACM
13 years 7 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...