Sciweavers

8177 search results - page 366 / 1636
» Detecting System Emulators
Sort
View
SMC
2007
IEEE
15 years 10 months ago
Mental tension detection in the speech based on physiological monitoring
— The focus of this paper is mental tension detection in speech to assist control the tension in day-to-day business such as conferences and operations in a call center. It is di...
Michiaki Ariga, Yoshikazu Yano, Shinji Doki, Shige...
109
Voted
ICDCSW
2005
IEEE
15 years 9 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
108
Voted
AIRS
2005
Springer
15 years 9 months ago
Finding New News: Novelty Detection in Broadcast News
The automatic detection of novelty, or newness, as part of an information retrieval system would greatly improve a searcher’s experience by presenting “documents” in order of...
Georgina Gaughan, Alan F. Smeaton
136
Voted
RAID
2005
Springer
15 years 9 months ago
Towards Software-Based Signature Detection for Intrusion Prevention on the Network Card
Abstract. CardGuard is a signature detection system for intrusion detection and prevention that scans the entire payload of packets for suspicious patterns and is implemented in so...
Herbert Bos, Kaiming Huang
115
Voted
CEAS
2004
Springer
15 years 9 months ago
Stopping Spam by Extrusion Detection
End users are often unaware that their systems have been compromised and are being used to send bulk unsolicited email (spam). We show how automated processing of the email logs re...
Richard Clayton