Sciweavers

1997 search results - page 47 / 400
» A Model for Data Leakage Detection
Sort
View
AUSAI
2003
Springer
15 years 5 months ago
Combining Multiple Host-Based Detectors Using Decision Tree
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
Sang-Jun Han, Sung-Bae Cho
ECBS
2004
IEEE
153views Hardware» more  ECBS 2004»
15 years 3 months ago
Architectural Description with Integrated Data Consistency Models
The focus of typical architectural models is the description of large systems. Even though these systems are usually distributed, aspects of distributed systems are only addressed...
Peter Tabeling
BMVC
2000
15 years 1 months ago
Morphological Change Detection Algorithms for Surveillance Applications
Vision-based systems for remote surveillance usually involve change detection algorithms for intruders, obstacles or irregularities detection. In particular, there is a potentiall...
Elena Stringa
ICPR
2008
IEEE
16 years 1 months ago
Efficient background modeling through incremental Support Vector Data Description
Background modeling is an essential and important part of many high-level video processing applications. Recently, the Support Vector Data Description (SVDD) has been introduced f...
Alireza Tavakkoli, Mircea Nicolescu, George Bebis,...
CVPR
2003
IEEE
16 years 1 months ago
Man-Made Structure Detection in Natural Images using a Causal Multiscale Random Field
This paper presents a generative model based approach to man-made structure detection in 2D natural images. The proposed approach uses a causal multiscale random field suggested i...
Sanjiv Kumar, Martial Hebert