Sciweavers

1216 search results - page 154 / 244
» Anomaly Detection Using an Ensemble of Feature Models
Sort
View
126
Voted
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 10 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
148
Voted
DBSEC
2008
188views Database» more  DBSEC 2008»
15 years 5 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
IROS
2007
IEEE
144views Robotics» more  IROS 2007»
15 years 9 months ago
Global action selection for illumination invariant color modeling
— A major challenge in the path of widespread use of mobile robots is the ability to function autonomously, learning useful features from the environment and using them to adapt ...
Mohan Sridharan, Peter Stone
136
Voted
CVPR
2007
IEEE
16 years 5 months ago
Multi-scale Structural Saliency for Signature Detection
Detecting and segmenting free-form objects from cluttered backgrounds is a challenging problem in computer vision. Signature detection in document images is one classic example an...
Guangyu Zhu, Yefeng Zheng, David S. Doermann, Stef...
166
Voted
DASFAA
2007
IEEE
199views Database» more  DASFAA 2007»
15 years 10 months ago
Detection and Visualization of Subspace Cluster Hierarchies
Subspace clustering (also called projected clustering) addresses the problem that different sets of attributes may be relevant for different clusters in high dimensional feature sp...
Elke Achtert, Christian Böhm, Hans-Peter Krie...