Sciweavers

6318 search results - page 122 / 1264
» Data Leakage Detection
Sort
View
ICCCN
2008
IEEE
15 years 8 months ago
Massively Parallel Anomaly Detection in Online Network Measurement
—Detecting anomalies during the operation of a network is an important aspect of network management and security. Recent development of high-performance embedded processing syste...
Shashank Shanbhag, Tilman Wolf
HPDC
2005
IEEE
15 years 7 months ago
A framework for efficient inconsistency detection in a grid and Internet-scale distributed environment
In this paper, we argue that a broad range of Internet-scale distributed applications can benefit from an underlying low-cost consistency detection framework – an alternative to...
Yijun Lu, Hong Jiang
ICNC
2005
Springer
15 years 7 months ago
Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection
The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set is the most widely used public benchmark for testing intrusion detection systems. But the presence...
Chuanhuan Yin, Shengfeng Tian, Houkuan Huang, Jun ...
113
Voted
CIVR
2004
Springer
189views Image Analysis» more  CIVR 2004»
15 years 7 months ago
Feature Based Cut Detection with Automatic Threshold Selection
There has been much work concentrated on creating accurate shot boundary detection algorithms in recent years. However a truly accurate method of cut detection still eludes researc...
Anthony Whitehead, Prosenjit Bose, Robert Lagani&e...
BMVC
2000
15 years 3 months ago
Morphological Change Detection Algorithms for Surveillance Applications
Vision-based systems for remote surveillance usually involve change detection algorithms for intruders, obstacles or irregularities detection. In particular, there is a potentiall...
Elena Stringa