Sciweavers

8177 search results - page 215 / 1636
» Detecting System Emulators
Sort
View
102
Voted
CCS
2004
ACM
15 years 6 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
ICPR
2008
IEEE
15 years 7 months ago
Detecting shadows of moving vehicles based on HMM
Vehicle detection and classification are invaluable in many transportation systems, such as traffic flow analysis, abnormal events detection, automotive driver assistant systems a...
Yuxuan Wang, Heng-Da Cheng, Juan Shan
67
Voted
ECAI
2004
Springer
15 years 6 months ago
Attention-Driven Parts-Based Object Detection
Recent studies have argued that natural vision systems perform classification by utilizing different mechanisms depending on the visual input. In this paper we present a hybrid, ...
Ilkka Autio, Jussi T. Lindgren
WDAG
2004
Springer
86views Algorithms» more  WDAG 2004»
15 years 6 months ago
Message-Optimal and Latency-Optimal Termination Detection Algorithms for Arbitrary Topologies
An important problem in distributed systems is to detect termination of a distributed computation. A computation is said to have terminated when all processes have become passive ...
Neeraj Mittal, Subbarayan Venkatesan, Sathya Peri
105
Voted
ACSAC
1998
IEEE
15 years 5 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer