Sciweavers

1804 search results - page 200 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
173
Voted
USS
2008
15 years 7 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
IPPS
2007
IEEE
15 years 11 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
131
Voted
ACSW
2006
15 years 6 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
181
Voted
CVIU
2010
267views more  CVIU 2010»
15 years 2 months ago
Accelerated hardware video object segmentation: From foreground detection to connected components labelling
This paper demonstrates the use of a single-chip FPGA for the segmentation of moving objects in a video sequence. The system maintains highly accurate background models, and integ...
Kofi Appiah, Andrew Hunter, Patrick Dickinson, Hon...
ECCV
2004
Springer
16 years 6 months ago
Synthesizing Dynamic Texture with Closed-Loop Linear Dynamic System
Dynamic texture can be defined as a temporally continuous and infinitely varying stream of images that exhibit certain temporal statistics. Linear dynamic system (LDS) represented ...
Lu Yuan, Fang Wen, Ce Liu, Heung-Yeung Shum