Sciweavers

2236 search results - page 120 / 448
» Intrusion detection techniques and approaches
Sort
View
CORR
2004
Springer
140views Education» more  CORR 2004»
14 years 10 months ago
Integrating Defeasible Argumentation and Machine Learning Techniques
The field of machine learning (ML) is concerned with the question of how to construct algorithms that automatically improve with experience. In recent years many successful ML app...
Sergio Alejandro Gómez, Carlos Iván ...
ECCV
2004
Springer
16 years 4 hour ago
Reliable Fiducial Detection in Natural Scenes
Reliable detection of fiducial targets in real-world images is addressed in this paper. We show that even the best existing schemes are fragile when exposed to other than laborator...
David Claus, Andrew W. Fitzgibbon
RAID
2001
Springer
15 years 2 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
ICIP
2009
IEEE
15 years 11 months ago
Image Tamper Detection Based On Demosaicing Artifacts
In this paper, we introduce tamper detection techniques based on artifacts created by Color Filter Array (CFA) processing in most digital cameras. The techniques are based on comp...
MVA
1992
14 years 11 months ago
A Hybrid Approach towards Segmentation of Range Images
This paper presents a technique for the segmentation of range images. It tends to be a hybrid approach that combines edge detection and region growing techniques toward accomplish...
Alan Wui Tze Lim, Eam Khwang Teoh, Dinesh P. Mital