Sciweavers

877 search results - page 137 / 176
» Intrusion detection systems as evidence
Sort
View
CIKM
2005
Springer
15 years 7 months ago
Detecting changes on unordered XML documents using relational databases: a schema-conscious approach
Several relational approaches have been proposed to detect the changes to XML documents by using relational databases. These approaches store the XML documents in the relational d...
Erwin Leonardi, Sourav S. Bhowmick
ICPR
2008
IEEE
16 years 3 months ago
Object detection at multiple scales improves accuracy
For detecting objects in natural visual scenes, several powerful image features have been proposed which can collectively be described as spatial histograms of oriented energy. Th...
Stanley M. Bileschi
ACSAC
2008
IEEE
15 years 8 months ago
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
Martin Johns, Björn Engelmann, Joachim Posegg...
RAID
2005
Springer
15 years 7 months ago
Anomalous Payload-Based Worm Detection and Signature Generation
New features of the PAYL anomalous payload detection sensor are demonstrated to accurately detect and generate signatures for zero-day worms. Experimental evidence demonstrates tha...
Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo
NIPS
2004
15 years 3 months ago
Contextual Models for Object Detection Using Boosted Random Fields
We seek to both detect and segment objects in images. To exploit both local image data as well as contextual information, we introduce Boosted Random Fields (BRFs), which use boos...
Antonio Torralba, Kevin P. Murphy, William T. Free...