Sciweavers

321 search results - page 3 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
JSW
2007
138views more  JSW 2007»
13 years 4 months ago
Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems
— The anomaly-based intrusion detection systems examine current system activity do find deviations from normal system activity. The present paper proposes a method for normal act...
Veselina G. Jecheva, Evgeniya P. Nikolova
JNCA
2007
179views more  JNCA 2007»
13 years 4 months ago
Modeling intrusion detection system using hybrid intelligent systems
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...
Sandhya Peddabachigari, Ajith Abraham, Crina Grosa...
TIP
2010
119views more  TIP 2010»
12 years 11 months ago
Trajectory Classification Using Switched Dynamical Hidden Markov Models
This paper proposes an approach for recognizing human activities (more specifically, pedestrian trajectories) in video sequences, in a surveillance context. A system for automatic ...
Jacinto C. Nascimento, Mário A. T. Figueire...
ISI
2008
Springer
13 years 4 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
JAIHC
2010
205views more  JAIHC 2010»
13 years 3 months ago
Soft computing in intrusion detection: the state of the art
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
Chet Langin, Shahram Rahimi