Sciweavers

765 search results - page 100 / 153
» Detecting Anomalies and Intruders
Sort
View
MVA
2007
150views Computer Vision» more  MVA 2007»
15 years 1 months ago
Detecting the Degree of Anomal in Security Video
We have developed a method that can discriminate anomalous image sequences for more efficiently utilizing security videos. To match the wide popularity of security cameras, the me...
Kyoko Sudo, Tatsuya Osawa, Xiaojun Wu, Kaoru Wakab...
CASES
2005
ACM
15 years 1 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
ACSAC
2008
IEEE
15 years 6 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
WACV
2012
IEEE
13 years 7 months ago
LOST: Longterm Observation of Scenes (with Tracks)
We introduce the Longterm Observation of Scenes (with Tracks) dataset. This dataset comprises videos taken from streaming outdoor webcams, capturing the same half hour, each day, ...
Austin Abrams, Jim Tucek, Joshua Little, Nathan Ja...
ICCSA
2005
Springer
15 years 5 months ago
M of N Features vs. Intrusion Detection
In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important ...
Zhuowei Li, Amitabha Das