Sciweavers

2269 search results - page 165 / 454
» Behavioral Intrusion Detection
Sort
View
WETICE
1999
IEEE
15 years 9 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
184
Voted

Publication
313views
15 years 5 months ago
Visual Surveillance: Dynamic Behavior Analysis at Multiple Levels
New cameras are installed daily all around the world. Hence it becomes increasingly important to develop methods for reducing the manual effort that is still required for video ana...
Michael D. Breitenstein
127
Voted
CVPR
2010
IEEE
16 years 14 days ago
Exploiting Simple Hierarchies for Unsupervised Human Behavior Analysis
We propose a data-driven, hierarchical approach for the analysis of human actions in visual scenes. In particular, we focus on the task of in-house assisted living. In such scenar...
Fabian Nater, Helmut Grabner, Luc Van Gool
FGR
2006
IEEE
175views Biometrics» more  FGR 2006»
15 years 10 months ago
Fully Automatic Facial Action Recognition in Spontaneous Behavior
We present results on a user independent fully automatic system for real time recognition of facial actions from the Facial Action Coding System (FACS). The system automatically d...
Marian Stewart Bartlett, Gwen Littlewort, Mark G. ...
ISCC
2000
IEEE
112views Communications» more  ISCC 2000»
15 years 9 months ago
RED Behavior with Different Packet Sizes
We consider the adaptation of random early detection (RED) as a buffer management algorithm for TCP traffic in Internet gateways where different maximum transfer units (MTUs) are ...
Stefaan De Cnodder, Omar Elloumi, Kenny Pauwels