Sciweavers

2269 search results - page 151 / 454
» Behavioral Intrusion Detection
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
Detecting Runtime Environment Interference with Parallel Application Behavior
Many performance problems observed in high end systems are actually caused by the runtime system and not the application code. Detecting these cases will require parallel performa...
Rashawn L. Knapp, Karen L. Karavanic, Douglas M. P...
151
Voted
ICMCS
2005
IEEE
111views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Video Based Online Behavior Detection Using Probabilistic Multi Stream Fusion
In the present treatise, we propose an approach for a highly configurable image based online person behaviour monitoring system. The particular application scenario is a crew sup...
Dejan Arsic, Frank Wallhoff, Björn Schuller, ...
170
Voted
AIPRF
2008
15 years 6 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
SAINT
2008
IEEE
15 years 11 months ago
Observing Walking Behavior of Humans Using Distributed Phenomenon Detection and Tracking Mechanisms
The utility of walking parameters such as stride length, cadence and gait velocity for monitoring motor functions of patients suffering from brain injury, Parkinson’s disease an...
Raja Bose, Abdelsalam Helal
RAID
2005
Springer
15 years 10 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh