Sciweavers

1804 search results - page 80 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
MM
2006
ACM
330views Multimedia» more  MM 2006»
15 years 4 months ago
Visual attention detection in video sequences using spatiotemporal cues
Human vision system actively seeks interesting regions in images to reduce the search effort in tasks, such as object detection and recognition. Similarly, prominent actions in v...
Yun Zhai, Mubarak Shah
ICC
2009
IEEE
107views Communications» more  ICC 2009»
15 years 4 months ago
EM-Based Maximum-Likelihood Sequence Detection for MIMO Optical Wireless Systems
—A major performance-limiting factor in terrestrial optical wireless (OW) systems is turbulence-induced fading. Exploiting the additional degrees of freedom in the spatial dimens...
Nestor D. Chatzidiamantis, Murat Uysal, Theodoros ...
ISMIS
2005
Springer
15 years 3 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
SE
2007
14 years 11 months ago
Isolating cause-effect chains in computer systems
: One of the major tasks in maintaining software systems is understanding how specific effects came to be. This is especially true for effects that cause major harm, and especiall...
Stephan Neuhaus, Andreas Zeller
IJISEC
2008
188views more  IJISEC 2008»
14 years 8 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...