Sciweavers

2236 search results - page 77 / 448
» Intrusion detection techniques and approaches
Sort
View
TCSV
2008
166views more  TCSV 2008»
14 years 9 months ago
A Framework for Evaluating Stereo-Based Pedestrian Detection Techniques
Automated pedestrian detection, counting, and tracking have received significant attention in the computer vision community of late. As such, a variety of techniques have been inve...
Philip Kelly, Noel E. O'Connor, Alan F. Smeaton
AVSS
2009
IEEE
15 years 3 months ago
Comparative Evaluation of Stationary Foreground Object Detection Algorithms Based on Background Subtraction Techniques
In several video surveillance applications, such as the detection of abandoned/stolen objects or parked vehicles, the detection of stationary foreground objects is a critical task...
Álvaro Bayona, Juan Carlos San Miguel, Jos&...
BMVC
2010
14 years 8 months ago
Detection of Curves with Unknown Endpoints using Minimal Path Techniques
We present a novel method to detect curves with unknown endpoints using minimal path techniques. Our work builds on the state of the art minimal path techniques currently used to ...
Vivek Kaul, Yichang Tsai, Anthony J. Yezzi
RAID
2007
Springer
15 years 4 months ago
Comparing Anomaly Detection Techniques for HTTP
Much data access occurs via HTTP, which is becoming a universal transport protocol. Because of this, it has become a common exploit target and several HTTP specific IDSs have been...
Kenneth L. Ingham, Hajime Inoue
CCS
2007
ACM
15 years 4 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...