Sciweavers

2269 search results - page 179 / 454
» Behavioral Intrusion Detection
Sort
View
DIMVA
2011
14 years 8 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
ISWC
2005
IEEE
15 years 10 months ago
Recognizing Mimicked Autistic Self-Stimulatory Behaviors Using HMMs
Children with autism often exhibit self-stimulatory (or “stimming”) behaviors. We present an on-body sensing system for continuous recognition of stimming activity. By creatin...
Tracy L. Westeyn, Kristin Vadas, Xuehai Bian, Thad...
MTA
2007
83views more  MTA 2007»
15 years 4 months ago
A study on multimedia documents behavior: a notion of equivalence
Abstract. In this paper we address the problem of comparing multimedia documents, which can be described according to different reference models. If we consider presentations as c...
Paola Bertolotti, Ombretta Gaggi
DAWAK
1999
Springer
15 years 9 months ago
OLAP-based Scalable Profiling of Customer Behavior
Profiling customers’ behavior has become increasingly important for many applications such as fraud detection, targeted marketing and promotion. Customer behavior profiles are cr...
Qiming Chen, Umeshwar Dayal, Meichun Hsu
ICCV
2005
IEEE
15 years 10 months ago
Separating Transparent Layers of Repetitive Dynamic Behaviors
In this paper we present an approach for separating two transparent layers of complex non-rigid scene dynamics. The dynamics in one of the layers is assumed to be repetitive, whil...
Bernard Sarel, Michal Irani