Sciweavers

415 search results - page 11 / 83
» Intruders pattern identification
Sort
View
ACSAC
2003
IEEE
15 years 5 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
IJON
2007
109views more  IJON 2007»
14 years 11 months ago
Monophonic sound source separation with an unsupervised network of spiking neurones
We incorporate auditory-based features into an unconventional pattern classification system, consisting of a network of spiking neurones with dynamical and multiplicative synapse...
Ramin Pichevar, Jean Rouat
INFFUS
2002
162views more  INFFUS 2002»
14 years 11 months ago
Fusion of multiple classifiers
The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against threats, a number of software tools have be...
Fabio Roli, Josef Kittler
ICIP
2005
IEEE
15 years 5 months ago
Digital "bullet scratches" for images
The problem investigated in this paper is identification of sensor that was used to obtain a given digital image. We show that the high-medium frequency component of the sensor pa...
Jan Lukás, Jessica J. Fridrich, Miroslav Go...
ICDAR
2003
IEEE
15 years 5 months ago
Writer Identification based on the fractal construction of a reference base
Our aim is to achieve writer identification process thanks to a fractal analysis of handwriting style. For each writer, a set of characteristics is extracted. They are specific to...
Audrey Seropian, M. Grimaldi, Nicole Vincent