Sciweavers

1997 search results - page 60 / 400
» A Model for Data Leakage Detection
Sort
View
SIGSOFT
2011
ACM
14 years 6 months ago
Modeling a distributed intrusion detection system using collaborative building blocks
Developing complex distributed systems is a non-trivial task. It is even more difficult when the systems need to dynamically reconfigure the distributed functionalities or tasks...
Linda Ariani Gunawan, Michael Vogel, Frank Alexand...
ASSETS
2007
ACM
15 years 3 months ago
Data visualisation and data mining technology for supporting care for older people
: The overall purpose of the research discussed here is the enhancement of home-based care by revealing individual patterns in the life of a person, through modelling of the "...
Nubia M. Gil, Nick A. Hine, John L. Arnott, Julien...
ICMLA
2008
15 years 1 months ago
Highly Scalable SVM Modeling with Random Granulation for Spam Sender Detection
Spam sender detection based on email subject data is a complex large-scale text mining task. The dataset consists of email subject lines and the corresponding IP address of the em...
Yuchun Tang, Yuanchen He, Sven Krasser
IJNSEC
2008
95views more  IJNSEC 2008»
14 years 12 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
CVPR
2010
IEEE
15 years 8 months ago
Fast Globally Optimal 2D Human Detection with Loopy Graph Models
This paper presents an algorithm for recovering the globally optimal 2D human figure detection using a loopy graph model. This is computationally challenging because the time comp...
Tai-Peng Tian, Stan Sclaroff