Sciweavers

877 search results - page 128 / 176
» Intrusion detection systems as evidence
Sort
View
INTERACT
2003
15 years 3 months ago
Be Quiet? Evaluating Proactive and Reactive User Interface Assistants
: This research examined the ability of an anthropomorphic interface assistant to help people learn and use an unfamiliar text-editing tool, with a specific focus on assessing proa...
Jun Xiao, Richard Catrambone, John T. Stasko
CCS
2007
ACM
15 years 5 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
ICMCS
2005
IEEE
94views Multimedia» more  ICMCS 2005»
15 years 7 months ago
Event detection based on generic characteristics of field-sports
In this paper we propose a generic framework for event detection in broadcast video of multiple different field-sports. Features indicating significant events are selected, and ro...
David A. Sadlier, Noel E. O'Connor
144
Voted
SCIA
2005
Springer
211views Image Analysis» more  SCIA 2005»
15 years 7 months ago
Perception-Action Based Object Detection from Local Descriptor Combination and Reinforcement Learning
This work proposes to learn visual encodings of attention patterns that enables sequential attention for object detection in real world environments. The system embeds a saccadic d...
Lucas Paletta, Gerald Fritz, Christin Seifert
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 2 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan