Sciweavers

4332 search results - page 759 / 867
» A Probabilistic Identification Result
Sort
View
ACMSE
2005
ACM
15 years 3 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
ECOOP
2005
Springer
15 years 3 months ago
Attached Types and Their Application to Three Open Problems of Object-Oriented Programming
The three problems of the title — the first two widely discussed in the literature, the third less well known but just as important for further development of object technology ...
Bertrand Meyer
VRST
2004
ACM
15 years 3 months ago
Observing effects of attention on presence with fMRI
Presence is one of the goals of many virtual reality systems. Historically, in the context of virtual reality, the concept of presence has been associated much with spatial percep...
Sungkil Lee, Gerard Jounghyun Kim, Janghan Lee
VIZSEC
2004
Springer
15 years 3 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
83
Voted
AVSS
2003
IEEE
15 years 3 months ago
Improving the Extraction of Temporal Motion Strength Signals from Video Recordings of Neonatal Seizures
Automated processing and analysis of video recordings of neonatal seizures can generate novel methods for extracting quantitative information that is relevant only to the seizure [...
Nicolaos B. Karayiannis, Guozhi Tao