Sciweavers

1804 search results - page 175 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
TSD
2010
Springer
15 years 2 months ago
Recovery of Rare Words in Lecture Speech
The vocabulary used in speech usually consists of two types of words: a limited set of common words, shared across multiple documents, and a virtually unlimited set of rare words, ...
Stefan Kombrink, Mirko Hannemann, Lukas Burget, Hy...
ICC
2009
IEEE
125views Communications» more  ICC 2009»
15 years 2 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
CVPR
2005
IEEE
16 years 6 months ago
Vehicle Segmentation and Tracking from a Low-Angle Off-Axis Camera
We present a novel method for visually monitoring a highway when the camera is relatively low to the ground and on the side of the road. In such a case, occlusion and the perspect...
Neeraj K. Kanhere, Shrinivas J. Pundlik, Stan Birc...
VIZSEC
2004
Springer
15 years 9 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
SISW
2005
IEEE
15 years 10 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash