Sciweavers

1523 search results - page 54 / 305
» Detecting and Sketching the Common
Sort
View
MMMACNS
2005
Springer
15 years 3 months ago
Prevention of Information Attacks by Run-Time Detection of Self-replication in Computer Codes
This paper describes a novel approach for preventative protection from both known and previously unknown malicious software. It does not rely on screening the code for signatures ...
Douglas H. Summerville, Victor A. Skormin, Alexand...
IEEEARES
2010
IEEE
15 years 3 months ago
Heuristics for Detecting Botnet Coordinated Attacks
— This paper studies the analysis on the Cyber Clean Center (CCC) Data Set 2009, consisting of raw packets captured more than 90 independent honeypots, in order for detecting beh...
Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, M...
SPIRE
2000
Springer
15 years 1 months ago
Fast Multipattern Search Algorithms for Intrusion Detection
We present new search algorithms to detect the occurrences of any pattern from a given pattern set in a text, allowing in the occurrences a limited number of spurious text charact...
Josué Kuri, Gonzalo Navarro
DICTA
2003
14 years 11 months ago
Fast Circle Detection Using Gradient Pair Vectors
The Circle Hough Transform (CHT) has become a common method for circle detection in numerous image processing applications. Because of its drawbacks, various modifications to the b...
Ali Ajdari Rad, Karim Faez, Navid Qaragozlou
ICASSP
2010
IEEE
14 years 10 months ago
Detecting local semantic concepts in environmental sounds using Markov model based clustering
Detecting the time of occurrence of an acoustic event (for instance, a cheer) embedded in a longer soundtrack is useful and important for applications such as search and retrieval...
Keansub Lee, Daniel P. W. Ellis, Alexander C. Loui