Sciweavers

109 search results - page 3 / 22
» Pattern Recognition Systems under Attack
Sort
View
MCS
2007
Springer
13 years 12 months ago
Classifier Combining Rules Under Independence Assumptions
Classifier combining rules are designed for the fusion of the results from the component classifiers in a multiple classifier system. In this paper, we firstly propose a theoretica...
Shoushan Li, Chengqing Zong
EDBT
2010
ACM
156views Database» more  EDBT 2010»
13 years 9 months ago
Pattern detector: fast detection of suspicious stream patterns for immediate reaction
Detecting emerging problems in information and manufacturing systems is the goal of monitoring tools. Good and timely detection of problematic conditions from measured indicators ...
Ira Assent, Hardy Kremer, Stephan Günnemann, ...
IH
2004
Springer
13 years 11 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
ICIAP
2005
ACM
14 years 5 months ago
Analyzing TCP Traffic Patterns Using Self Organizing Maps
The continuous evolution of the attacks against computer networks has given renewed strength to research on anomaly based Intrusion Detection Systems, capable of automatically dete...
Stefano Zanero
WSCG
2000
84views more  WSCG 2000»
13 years 7 months ago
New Theory of Pattern Recognition on the Basis of Stochastic Geometry
The article offers a new approach towards the construction of recognition features independent of images' displacement or linear deformation. The distinguishing characteristi...
Nikolay G. Fedotov, Luydmila A. Shulga