Sciweavers

1804 search results - page 103 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
CVPR
1997
IEEE
16 years 4 days ago
Recursive Structure and Motion from Image Sequences using Shape and Depth Spaces
In this paper a novel recursive method for estimating structure and motion from image sequences is presented. The novelty lies in the fact that the output of the algorithm is inde...
Rikard Berthilsson, Anders Heyden, Gunnar Sparr
IJCAI
1997
14 years 11 months ago
Name-It: Naming and Detecting Faces in Video by the Integration of Image and Natural Language Processing
We have been developing Name-It, a system that associates faces and names in news videos. First, as the only knowledge source, the system is given news videos which include image ...
Shin'ichi Satoh, Yuichi Nakamura, Takeo Kanade
ICCS
2007
Springer
15 years 4 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
87
Voted
CSFW
2006
IEEE
15 years 4 months ago
On the Completeness of Attack Mutation Algorithms
An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances by repeatedly applying attack transformations. Such algorithms are ...
Shai Rubin, Somesh Jha, Barton P. Miller
IPSN
2010
Springer
15 years 5 months ago
A system for distributed event detection in wireless sensor networks
Event detection is a major issue for applications of wireless sensor networks. In order to detect an event, a sensor network has to identify which application-specific incident h...
Georg Wittenburg, Norman Dziengel, Christian Warte...