Sciweavers

271 search results - page 18 / 55
» Multi-target Detection by Multi-sensor Systems: A Comparison...
Sort
View
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
15 years 1 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
CORR
2011
Springer
182views Education» more  CORR 2011»
14 years 4 months ago
Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design
— Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and adv...
Fabio Pasqualetti, Florian Dörfler, Francesco...
IRI
2006
IEEE
15 years 3 months ago
A similarity based technique for detecting malicious executable files for computer forensics
With the rapidly increasing complexity of computer systems and the sophistication of hacking tools and techniques, there is a crucial need for computer forensic analysis technique...
Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. ...
83
Voted
MOBISYS
2008
ACM
15 years 9 months ago
Brimon: a sensor network system for railway bridge monitoring
: Railway systems are critical in many regions, and can consist of several tens of thousands of bridges, being used over several decades. It is critical to have a system to monitor...
Kameswari Chebrolu, Bhaskaran Raman, Nilesh Mishra...
100
Voted
FGR
2011
IEEE
238views Biometrics» more  FGR 2011»
14 years 1 months ago
The first facial expression recognition and analysis challenge
— Automatic Facial Expression Recognition and Analysis, in particular FACS Action Unit (AU) detection and discrete emotion detection, has been an active topic in computer science...
Michel François Valstar, Bihan Jiang, Marc ...