Sciweavers

8177 search results - page 409 / 1636
» Detecting System Emulators
Sort
View
152
Voted
TISSEC
2010
119views more  TISSEC 2010»
14 years 10 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
ICPR
2008
IEEE
16 years 5 months ago
Randomized trees for real-time one-step face detection and recognition
We present a system for detecting and recognizing faces in images in real-time which is able to learn new identities in instants. In mobile service robotics, interaction with pers...
Stefan Schiffer 0002, Thomas Deselaers, Vaishak Be...
MICCAI
2004
Springer
16 years 4 months ago
Nodule Detection in Postero Anterior Chest Radiographs
The use of image processing techniques and Computer Aided Diagnosis (CAD) systems has proved to be effective for the improvement of radiologists' diagnosis, especially in the ...
Paola Campadelli, Elena Casiraghi
MOBISYS
2008
ACM
16 years 3 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
ICC
2009
IEEE
123views Communications» more  ICC 2009»
15 years 10 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...