Sciweavers

79 search results - page 7 / 16
» Different approaches for the detection of SSH anomalous conn...
Sort
View
WISEC
2010
ACM
15 years 4 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
ISBI
2011
IEEE
14 years 1 months ago
Structural connectivity via the tensor-based morphometry
The tensor-based morphometry (TBM) has been widely used in characterizing tissue volume difference between populations at voxel level. We present a novel computational framework f...
Seung-Goo Kim, Moo K. Chung, Jamie L. Hanson, Bria...
ICCV
2011
IEEE
13 years 9 months ago
Gaussian Process Regression Flow for Analysis of Motion Trajectories
Recognition of motions and activities of objects in videos requires effective representations for analysis and matching of motion trajectories. In this paper, we introduce a new r...
Kihwan Kim, Dongryeol Lee, Irfan Essa
GLOBECOM
2006
IEEE
15 years 3 months ago
Voice Activity Detection for VoIP-An Information Theoretic Approach
— Voice enabled applications over the Internet are rapidly gaining popularity. Reducing the total bandwidth requirement can make a non-trivial difference for the subscribers havi...
R. Venkatesha Prasad, R. Muralishankar, S. Vijay, ...
AINA
2008
IEEE
14 years 11 months ago
Monitoring Network Traffic to Detect Stepping-Stone Intrusion
Most network intruders tend to use stepping-stones to attack or to invade other hosts to reduce the risks of being discovered. There have been many approaches that were proposed t...
Jianhua Yang, Byong Lee, Stephen S. H. Huang