Sciweavers

877 search results - page 150 / 176
» Intrusion detection systems as evidence
Sort
View
118
Voted
GLOBECOM
2010
IEEE
14 years 11 months ago
Independent Parallel Compact Finite Automatons for Accelerating Multi-String Matching
Multi-string matching is a key technique for implementing network security applications like Network Intrusion Detection Systems (NIDS) and anti-virus scanners. Existing DFA-based ...
Yi Tang, Junchen Jiang, Xiaofei Wang, Bin Liu, Yan...
TMA
2010
Springer
150views Management» more  TMA 2010»
14 years 11 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
ISESE
2005
IEEE
15 years 7 months ago
Cloning by accident: an empirical study of source code cloning across software systems
One of the key goals of open source development is the sharing of knowledge, experience, and solutions that pertain to a software system and its problem domain. Source code clonin...
Raihan Al-Ekram, Cory Kapser, Richard C. Holt, Mic...
CIVR
2008
Springer
245views Image Analysis» more  CIVR 2008»
15 years 3 months ago
Probabilistic optimized ranking for multimedia semantic concept detection via RVM
We present a probabilistic ranking-driven classifier for the detection of video semantic concept, such as airplane, building, etc. Most existing concept detection systems utilize ...
Yantao Zheng, Shi-Yong Neo, Tat-Seng Chua, Qi Tian
PAMI
2008
275views more  PAMI 2008»
15 years 1 months ago
Coupled Object Detection and Tracking from Static Cameras and Moving Vehicles
Abstract-- We present a novel approach for multi-object tracking which considers object detection and spacetime trajectory estimation as a coupled optimization problem. Our approac...
Bastian Leibe, Konrad Schindler, Nico Cornelis, Lu...