Sciweavers

1997 search results - page 37 / 400
» A Model for Data Leakage Detection
Sort
View
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 6 days ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
PAMI
2010
160views more  PAMI 2010»
14 years 10 months ago
In the Eye of the Beholder: A Survey of Models for Eyes and Gaze
—Despite active research and significant progress in the last 30 years, eye detection and tracking remains challenging due to the individuality of eyes, occlusion, variability in...
Dan Witzner Hansen, Qiang Ji
ACSAC
2004
IEEE
15 years 3 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...
ICASSP
2011
IEEE
14 years 3 months ago
Statistical analysis of multi-channel detection using data from airborne AESA radar
We investigate the ground clutter homogeneity and target detection performance using airborne multi-channel AESA (Active Electronically Scanned Array) radar data from flight trial...
Johan Degerman, Thomas Pernstal, Magnus Gisselfalt...
DASFAA
2005
IEEE
157views Database» more  DASFAA 2005»
15 years 5 months ago
Adaptively Detecting Aggregation Bursts in Data Streams
Finding bursts in data streams is attracting much attention in research community due to its broad applications. Existing burst detection methods suffer the problems that 1) the p...
Aoying Zhou, Shouke Qin, Weining Qian