Sciweavers

1804 search results - page 154 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
GECCO
2007
Springer
129views Optimization» more  GECCO 2007»
15 years 10 months ago
Procreating V-detectors for nonself recognition: an application to anomaly detection in power systems
The artificial immune system approach for self-nonself discrimination and its application to anomaly detection problems in engineering is showing great promise. A seminal contribu...
Min Gui, Sanjoy Das, Anil Pahwa
TRECVID
2007
15 years 5 months ago
ENST/UOB/LU@TRECVID2007 HIGH LEVEL FEATURE EXTRACTION USING 2-LEVEL PIECEWISE GMM
We describe a high level feature extraction system for video. Video sequences are modeled using Gaussian Mixture Models. We have used those models in the past to segment video seq...
George Yazbek, Georges Kfoury, Gabriel Alam, Chafi...
IH
1999
Springer
15 years 8 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel
BMCBI
2006
104views more  BMCBI 2006»
15 years 4 months ago
SinicView: A visualization environment for comparisons of multiple nucleotide sequence alignment tools
Background: Deluged by the rate and complexity of completed genomic sequences, the need to align longer sequences becomes more urgent, and many more tools have thus been developed...
Arthur Chun-Chieh Shih, D. T. Lee, Laurent Lin, Ch...
CEAS
2011
Springer
14 years 4 months ago
Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems
Web mail providers rely on users to “vote” to quickly and collaboratively identify spam messages. Unfortunately, spammers have begun to use bots to control large collections o...
Anirudh Ramachandran, Anirban Dasgupta, Nick Feams...