Sciweavers

1997 search results - page 68 / 400
» A Model for Data Leakage Detection
Sort
View
CIA
2008
Springer
15 years 1 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
CVPR
1999
IEEE
16 years 1 months ago
Deformable Template and Distribution Mixture-Based Data Modeling for the Endocardial Contour Tracking in an Echographic Sequence
We1 present a new method to shape-based segmentation of deformable anatomical structures in medical images and validate this approach by detecting and tracking the endocardial bor...
Max Mignotte, Jean Meunier
ICST
2010
IEEE
14 years 9 months ago
Automated Test Data Generation on the Analyses of Feature Models: A Metamorphic Testing Approach
A Feature Model (FM) is a compact representation of all the products of a software product line. The automated extraction of information from FMs is a thriving research topic invo...
Sergio Segura, Robert M. Hierons, David Benavides,...
CORR
2008
Springer
125views Education» more  CORR 2008»
14 years 12 months ago
Data Reduction in Intrusion Alert Correlation
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Gianni Tedesco, Uwe Aickelin
ICASSP
2009
IEEE
15 years 6 months ago
Detecting real life anger
Acoustic anger detection in voice portals can help to enhance human computer interaction. A comprehensive voice portal data collection has been carried out and gives new insight o...
Felix Burkhardt, Tim Polzehl, Joachim Stegmann, Fl...