Sciweavers

1804 search results - page 135 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
PSIVT
2009
Springer
252views Multimedia» more  PSIVT 2009»
15 years 8 months ago
Moving Object Segmentation Using Optical Flow and Depth Information
This paper discusses the detection of moving objects (being a crucial part of driver assistance systems) using monocular or stereoscopic computer vision. In both cases, object dete...
Jens Klappstein, Tobi Vaudrey, Clemens Rabe, Andre...
ACSAC
2004
IEEE
15 years 8 months ago
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type
One of the growing problems faced by network administrators is the abuse of computing resources by authorized and unauthorized personnel. The nature of abuse may vary from using u...
Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. ...
NDSS
2009
IEEE
15 years 11 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov
MVA
1990
15 years 5 months ago
Movement Vector Detection with Reliability Indices
There is one method, called the Block Gradient Method here, whereby to detect image movements from an image sequence. This method has an advantage over the computing costs in a mo...
Naoya Ohta
BMCBI
2006
169views more  BMCBI 2006»
15 years 4 months ago
Assessing protein similarity with Gene Ontology and its use in subnuclear localization prediction
Background: The accomplishment of the various genome sequencing projects resulted in accumulation of massive amount of gene sequence information. This calls for a large-scale comp...
Zhengdeng Lei, Yang Dai