Sciweavers

8177 search results - page 330 / 1636
» Detecting System Emulators
Sort
View
CVPR
2007
IEEE
16 years 5 months ago
Saliency Detection: A Spectral Residual Approach
The ability of human visual system to detect visual saliency is extraordinarily fast and reliable. However, computational modeling of this basic intelligent behavior still remains...
Xiaodi Hou, Liqing Zhang
138
Voted
WWW
2008
ACM
16 years 4 months ago
Improving web spam detection with re-extracted features
Web spam detection has become one of the top challenges for the Internet search industry. Instead of using some heuristic rules, we propose a feature re-extraction strategy to opt...
Guanggang Geng, Chunheng Wang, Qiudan Li
PAKDD
2009
ACM
115views Data Mining» more  PAKDD 2009»
15 years 10 months ago
Data Mining for Intrusion Detection: From Outliers to True Intrusions
Data mining for intrusion detection can be divided into several sub-topics, among which unsupervised clustering has controversial properties. Unsupervised clustering for intrusion...
Goverdhan Singh, Florent Masseglia, Céline ...
163
Voted
ASIAN
2007
Springer
174views Algorithms» more  ASIAN 2007»
15 years 9 months ago
Combining Heterogeneous Classifiers for Network Intrusion Detection
Extensive use of computer networks and online electronic data and high demand for security has called for reliable intrusion detection systems. A repertoire of different classifier...
Ali Borji
ICARIS
2007
Springer
15 years 9 months ago
Towards a Novel Immune Inspired Approach to Temporal Anomaly Detection
Abstract. In this conceptual paper, we report on studies and initial definitions of an immune-inspired approach to temporal anomaly detection problems, where there is a strict temp...
Thiago S. Guzella, Tomaz A. Mota-Santos, Walmir M....