Sciweavers

1804 search results - page 195 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
159
Voted
CCS
2009
ACM
15 years 11 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
151
Voted
PAMI
2006
193views more  PAMI 2006»
15 years 4 months ago
A System for Learning Statistical Motion Patterns
Analysis of motion patterns is an effective approach for anomaly detection and behavior prediction. Current approaches for the analysis of motion patterns depend on known scenes, w...
Weiming Hu, Xuejuan Xiao, Zhouyu Fu, Dan Xie, Tien...
ICPR
2004
IEEE
16 years 5 months ago
Vision Based Fire Detection
Vision based fire detection is potentially a useful technique. With the increase in the number of surveillance cameras being installed, a vision based fire detection capability ca...
Che-Bin Liu, Narendra Ahuja
ICPR
2008
IEEE
15 years 11 months ago
Scribble-a-Secret: Similarity-based password authentication using sketches
This paper presents a sketch-based password authentication system called Scribble-a-Secret as a graphical password scheme in which free-form drawings are used as a means to authen...
Mizuki Oka, Kazuhiko Kato, Yingqing Xu, Lin Liang,...
176
Voted
SPIESR
1997
143views Database» more  SPIESR 1997»
15 years 5 months ago
Similarity Evaluation in Image Retrieval Using Simple Features
The development of increasingly complex multimedia applications calls for new methodologies for the organization and retrieval of still images and video sequences. Query and retri...
Eugenio Di Sciascio, Augusto Celentano