It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
— This paper introduces the establishment of PolyU Near-Infrared Face Database (PolyU-4 NIRFD) and presents a new coding scheme for face recognition. The PolyU-NIRFD contains ima...
Baochang Zhang, Lei Zhang 0006, David Zhang, Linli...
This paper identifies a novel feature space to address the problem of human face recognition from still images. This is based on the PCA space of the features extracted by a new m...
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...