Sciweavers

2269 search results - page 288 / 454
» Behavioral Intrusion Detection
Sort
View
ICMCS
2006
IEEE
138views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Detecting Malicious Hosts in the Presence of Lying Hosts in Peer-to-Peer Streaming
Current peer-to-peer (P2P) streaming systems often assume that hosts are cooperative. However, this may not be true in the open environment of the Internet. In this paper, we disc...
Xing Jin, S.-H. Gary Chan, Wai-Pun Ken Yiu, Yongqi...
136
Voted
EVOW
2009
Springer
15 years 9 months ago
Efficient Signal Processing and Anomaly Detection in Wireless Sensor Networks
In this paper the node-level decision unit of a self-learning anomaly detection mechanism for office monitoring with wireless sensor nodes is presented. The node-level decision uni...
Markus Wälchli, Torsten Braun
151
Voted
CEAS
2006
Springer
15 years 8 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...
NIPS
2004
15 years 6 months ago
The power of feature clustering: An application to object detection
We give a fast rejection scheme that is based on image segments and demonstrate it on the canonical example of face detection. However, instead of focusing on the detection step w...
Shai Avidan, Moshe Butman
VISSYM
2003
15 years 6 months ago
Detecting Critical Regions in Scalar Fields
Trivariate data is commonly visualized using isosurfaces or direct volume rendering. When exploring scalar fields by isosurface extraction it is often difficult to choose isoval...
Gunther H. Weber, Gerik Scheuermann, Bernd Hamann