Sciweavers

587 search results - page 45 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
CCIA
2007
Springer
15 years 6 months ago
Mendelian error detection in complex pedigrees using weighted constraint satisfaction techniques
With the arrival of high throughput genotyping techniques, the detection of likely genotyping errors is becoming an increasingly important problem. In this paper we are interested...
Martí Sánchez, Simon de Givry, Thoma...
IAT
2007
IEEE
15 years 6 months ago
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods
Phishing attack is a kind of identity theft which tries to steal confidential data like on-line bank account information. In a phishing attack scenario, attacker deceives users by...
Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bid...
99
Voted
IMC
2006
ACM
15 years 6 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...
104
Voted
EOR
2008
90views more  EOR 2008»
15 years 16 days ago
Quality of service statistics over heterogeneous networks: Analysis and applications
Heterogeneous wireless/wired networks and ubiquitous environments are gaining ever more attention by research community. To properly control and manage such puzzles a deep knowled...
Alessio Botta, Antonio Pescapè, Giorgio Ven...
79
Voted
ICIP
2005
IEEE
16 years 2 months ago
Aircraft detection and tracking using intelligent cameras
Systems that provide ground movement management at airports, maintaining ground safety and increasing air traffic capacity, are called A-SMGCS (Advanced Surface Movement Guidance a...
Kosmas Dimitropoulos, Nikos Grammalidis, Dimitrios...