Sciweavers

8177 search results - page 212 / 1636
» Detecting System Emulators
Sort
View
105
Voted
AIR
2004
131views more  AIR 2004»
15 years 19 days ago
A Survey of Outlier Detection Methodologies
Abstract. Outlier detection has been used for centuries to detect and, where appropriate, remove anomalous observations from data. Outliers arise due to mechanical faults, changes ...
Victoria J. Hodge, Jim Austin
ECCV
2008
Springer
16 years 2 months ago
Simultaneous Detection and Registration for Ileo-Cecal Valve Detection in 3D CT Colonography
Object detection and recognition has achieved a significant progress in recent years. However robust 3D object detection and segmentation in noisy 3D data volumes remains a challen...
Le Lu, Adrian Barbu, Matthias Wolf, Jianming Liang...
105
Voted
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
15 years 7 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis
STORAGESS
2005
ACM
15 years 6 months ago
Storage-based file system integrity checker
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-intime copy and performs file system integrity checks to detec...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
DISCEX
2003
IEEE
15 years 6 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes