Sciweavers

117 search results - page 19 / 24
» Computational Intelligence for Network Intrusion Detection: ...
Sort
View
NDSS
2008
IEEE
15 years 3 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
ICANN
2009
Springer
15 years 4 months ago
Multimodal Sparse Features for Object Detection
In this paper the sparse coding principle is employed for the representation of multimodal image data, i.e. image intensity and range. We estimate an image basis for frontal face i...
Martin Haker, Thomas Martinetz, Erhardt Barth
ISPASS
2009
IEEE
15 years 4 months ago
Evaluating GPUs for network packet signature matching
Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traffic shaping, and load balancing. At the heart of such servi...
Randy Smith, Neelam Goyal, Justin Ormont, Karthike...
AAAI
2004
14 years 11 months ago
Rapid Object Recognition from Discriminative Regions of Interest
Object recognition and detection represent a relevant component in cognitive computer vision systems, such as in robot vision, intelligent video surveillance systems, or multi-mod...
Gerald Fritz, Christin Seifert, Lucas Paletta, Hor...
CEC
2008
IEEE
15 years 4 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith