Sciweavers

8177 search results - page 329 / 1636
» Detecting System Emulators
Sort
View
130
Voted
CORR
2010
Springer
167views Education» more  CORR 2010»
15 years 3 months ago
The DCA:SOMe Comparison A comparative study between two biologically-inspired algorithms
The Dendritic Cell Algorithm (DCA) is an immune-inspired algorithm, developed for the purpose of anomaly detection. The algorithm performs multi-sensor data fusion and correlation ...
Julie Greensmith, Jan Feyereisl, Uwe Aickelin
118
Voted
CN
2007
106views more  CN 2007»
15 years 3 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
152
Voted
ISI
2008
Springer
15 years 3 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
171
Voted
BMCBI
2007
151views more  BMCBI 2007»
15 years 3 months ago
A comparison study on algorithms of detecting long forms for short forms in biomedical text
Motivation: With more and more research dedicated to literature mining in the biomedical domain, more and more systems are available for people to choose from when building litera...
Manabu Torii, Zhang-Zhi Hu, Min Song, Cathy H. Wu,...
121
Voted
CVPR
2007
IEEE
16 years 5 months ago
Towards Robust Pedestrian Detection in Crowded Image Sequences
Object class detection in scenes of realistic complexity remains a challenging task in computer vision. Most recent approaches focus on a single and general model for object class...
Edgar Seemann, Mario Fritz, Bernt Schiele