Sciweavers

270 search results - page 50 / 54
» Network-Based Intrusion Detection Using Adaboost Algorithm
Sort
View
117
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 1 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
118
Voted
CVPR
2004
IEEE
16 years 3 months ago
Learning a Restricted Bayesian Network for Object Detection
Many classes of images have the characteristics of sparse structuring of statistical dependency and the presence of conditional independencies among various groups of variables. S...
Henry Schneiderman
88
Voted
SACMAT
2003
ACM
15 years 6 months ago
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to ...
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
138
Voted
JMLR
2008
148views more  JMLR 2008»
15 years 1 months ago
Linear-Time Computation of Similarity Measures for Sequential Data
Efficient and expressive comparison of sequences is an essential procedure for learning with sequential data. In this article we propose a generic framework for computation of sim...
Konrad Rieck, Pavel Laskov
137
Voted
ICIP
2007
IEEE
15 years 1 months ago
Information-Based Color Feature Representation for Image Classification
1 For the image classification task, the color histogram is widely used as an important color feature indicating the content of the image. However, the high-resolution color histog...
Shi-Lin Wang, Alan Wee-Chung Liew