Sciweavers

415 search results - page 11 / 83
» Intruders pattern identification
Sort
View
ACSAC
2003
IEEE
15 years 3 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
IJON
2007
109views more  IJON 2007»
14 years 9 months ago
Monophonic sound source separation with an unsupervised network of spiking neurones
We incorporate auditory-based features into an unconventional pattern classification system, consisting of a network of spiking neurones with dynamical and multiplicative synapse...
Ramin Pichevar, Jean Rouat
INFFUS
2002
162views more  INFFUS 2002»
14 years 9 months ago
Fusion of multiple classifiers
The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against threats, a number of software tools have be...
Fabio Roli, Josef Kittler
ICIP
2005
IEEE
15 years 3 months ago
Digital "bullet scratches" for images
The problem investigated in this paper is identification of sensor that was used to obtain a given digital image. We show that the high-medium frequency component of the sensor pa...
Jan Lukás, Jessica J. Fridrich, Miroslav Go...
ICDAR
2003
IEEE
15 years 3 months ago
Writer Identification based on the fractal construction of a reference base
Our aim is to achieve writer identification process thanks to a fractal analysis of handwriting style. For each writer, a set of characteristics is extracted. They are specific to...
Audrey Seropian, M. Grimaldi, Nicole Vincent