Sciweavers

6318 search results - page 28 / 1264
» Data Leakage Detection
Sort
View
NETWORKING
2004
14 years 11 months ago
Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data
If efficient network analysis tools were available, it could become possible to detect the attacks, anomalies and to appropriately take action to contain the attacks. In this paper...
Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannu...
IJSR
2010
181views more  IJSR 2010»
14 years 8 months ago
Multi-Part People Detection Using 2D Range Data
People detection is a key capacity for robotics systems that have to interact with humans. This paper addresses the problem of detecting people using multiple layers of 2D laser ra...
Óscar Martínez Mozos, Ryo Kurazume, ...
KDD
2003
ACM
155views Data Mining» more  KDD 2003»
15 years 10 months ago
Graph-based anomaly detection
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including fraud detection and network intrusion detection. A ...
Caleb C. Noble, Diane J. Cook
DASFAA
2010
IEEE
195views Database» more  DASFAA 2010»
15 years 1 months ago
BIDEL: An XML-Based System for Effective Fast Change Detection of Genomic and Proteomic Data
Abstract. A key issue to address in biological data integration is how to detect changes to the underlying biological data sources. In this demonstration, we present a novel system...
Song Yang, Sourav S. Bhowmick
IRI
2005
IEEE
15 years 3 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...