Sciweavers

2236 search results - page 92 / 448
» Intrusion detection techniques and approaches
Sort
View
CCS
2008
ACM
14 years 12 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
RV
2010
Springer
119views Hardware» more  RV 2010»
14 years 8 months ago
LarvaStat: Monitoring of Statistical Properties
Execution paths expose non-functional information such as system reliability and performance, which can be collected using runtime verification techniques. Statistics gathering an...
Christian Colombo, Andrew Gauci, Gordon J. Pace
TMI
2002
143views more  TMI 2002»
14 years 9 months ago
A Support Vector Machine Approach for Detection of Microcalcifications
In this paper, we investigate an approach based on support vector machines (SVMs) for detection of microcalcification (MC) clusters in digital mammograms, and propose a successive ...
Issam El-Naqa, Yongyi Yang, Miles N. Wernick, Niko...
PCM
2001
Springer
126views Multimedia» more  PCM 2001»
15 years 2 months ago
Comparison of Word and Subword Indexing Techniques for Mandarin Chinese Spoken Document Retrieval
In this paper, we investigate the use of words and subwords (including both characters and syllables) in audio indexing for Mandarin Chinese spoken document retrieval. Two retrieva...
Hsin-Min Wang, Berlin Chen
AVSS
2008
IEEE
14 years 10 months ago
Multi-view Access Monitoring and Singularization in Interlocks
We present a method aimed at monitoring access to interlocks and secured entrance areas, which deploys two views in order to robustly perform intrusion detection and singularizati...
Luigi di Stefano, Federico Tombari, Stefano Mattoc...