Sciweavers

79 search results - page 9 / 16
» Different approaches for the detection of SSH anomalous conn...
Sort
View
JCB
2007
108views more  JCB 2007»
14 years 9 months ago
A Dynamic Programming Approach for Finding Common Patterns in RNAs
We developed a dynamic programming approach of computing common sequence structure patterns among two RNAs given their primary sequences and their secondary structures. Common pat...
Sven Siebert, Rolf Backofen
BMCBI
2010
110views more  BMCBI 2010»
14 years 9 months ago
TimeDelay-ARACNE: Reverse engineering of gene networks from time-course data by an information theoretic approach
Background: One of main aims of Molecular Biology is the gain of knowledge about how molecular components interact each other and to understand gene function regulations. Using mi...
Pietro Zoppoli, Sandro Morganella, Michele Ceccare...
CVPR
2007
IEEE
15 years 11 months ago
Belief Propagation in a 3D Spatio-temporal MRF for Moving Object Detection
Previous pixel-level change detection methods either contain a background updating step that is costly for moving cameras (background subtraction) or can not locate object positio...
Zhaozheng Yin, Robert T. Collins
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
15 years 4 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
NDSS
2009
IEEE
15 years 4 months ago
Detecting Forged TCP Reset Packets
Several off-the-shelf products enable network operators to enforce usage restrictions by actively terminating connections when deemed undesirable. While the spectrum of their appl...
Nicholas Weaver, Robin Sommer, Vern Paxson