Sciweavers

5435 search results - page 46 / 1087
» Informed Detection Revisited
Sort
View
IWIA
2006
IEEE
15 years 8 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
ICIP
2003
IEEE
16 years 3 months ago
Video caption detection and extraction using temporal information
Video caption detection,and evtraction is an important step for information retrieval in video databases. In this paper, we extract test information in video by fully utilizing th...
Bo Luo, Xiaoou Tang, Jianzhuang Liu, HongJiang Zha...
HT
2005
ACM
15 years 7 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
SPIESR
2001
133views Database» more  SPIESR 2001»
15 years 3 months ago
Shot detection combining Bayesian and structural information
There are a number of shots in a video, each of which has boundary types, such as cut, fade, dissolve and wipe. Many previous approaches can find the cut boundary without difficul...
Seung-Hoon Han, In-So Kweon
ICTAI
2008
IEEE
15 years 8 months ago
Knee Point Detection on Bayesian Information Criterion
The main challenge of cluster analysis is that the number of clusters or the number of model parameters is seldom known, and it must therefore be determined before clustering. Bay...
Qinpei Zhao, Mantao Xu, Pasi Fränti