Sciweavers

877 search results - page 161 / 176
» Intrusion detection systems as evidence
Sort
View
CCS
2008
ACM
15 years 3 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
ICIP
2002
IEEE
16 years 3 months ago
Long term tracking using Bayesian networks
This paper addresses long term tracking of multiple objects with occlusions. Bayesian networks are used to model the interaction among the detected tracks and for conflict managem...
Arnaldo J. Abrantes, João Miranda Lemos, Jo...
SECURWARE
2008
IEEE
15 years 8 months ago
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
— Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to analyze the potential risk factors to which ADSL cust...
Yannick Carlinet, Ludovic Mé, Hervé ...
IROS
2007
IEEE
157views Robotics» more  IROS 2007»
15 years 8 months ago
A spatio-temporal probabilistic model for multi-sensor object recognition
— This paper presents a general framework for multi-sensor object recognition through a discriminative probabilistic approach modelling spatial and temporal correlations. The alg...
Bertrand Douillard, Dieter Fox, Fabio T. Ramos
BMCV
2000
Springer
15 years 6 months ago
The Role of Natural Image Statistics in Biological Motion Estimation
While a great deal of experimental evidence supports the Reichardt correlator as a mechanism for biological motion detection, the correlator does not signal true image velocity. Th...
Ron O. Dror, David C. O'Carroll, Simon B. Laughlin