Sciweavers

1804 search results - page 191 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
156
Voted
TITS
2011
247views more  TITS 2011»
14 years 11 months ago
Road Detection Based on Illuminant Invariance
—By using an onboard camera, it is possible to detect the free road surface ahead of the ego-vehicle. Road detection is of high relevance for autonomous driving, road departure w...
José M. Álvarez, Antonio M. Lopez
ISMIR
2001
Springer
146views Music» more  ISMIR 2001»
15 years 9 months ago
An Audio Front End for Query-by-Humming Systems
In this paper, the problem of processing audio signals is addressed in the context of query-by-humming systems. Since singing is naturally used as input, we aim to develop a front...
Emanuele Pollastri
144
Voted
HSNMC
2004
Springer
106views Multimedia» more  HSNMC 2004»
15 years 10 months ago
Performance Evaluation of a Probabilistic Packet Filter Optimization Algorithm for High-Speed Network Monitoring
Because of the ever-increasing popularity of the Internet, network monitoring becomes very mission critical to guarantee the operation of IP networks, e.g. to detect network failur...
Jan Coppens, Stijn De Smet, Steven Van den Berghe,...
138
Voted
ISCC
2003
IEEE
140views Communications» more  ISCC 2003»
15 years 9 months ago
A Low-Energy Key Management Protocol for Wireless Sensor Networks
Sensor networks have recently gained popularity for a wide spectrum of applications. When performing monitoring tasks in hostile environments, security requirements become critical...
Gaurav Jolly, Mustafa C. Kusçu, Pallavi Kok...
153
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 11 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto