Sciweavers

321 search results - page 17 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
92
Voted
MMSEC
2005
ACM
147views Multimedia» more  MMSEC 2005»
15 years 5 months ago
A Bayesian image steganalysis approach to estimate the embedded secret message
Image steganalysis so far has dealt only with detection of a hidden message and estimation of some of its parameters (e.g., message length and secret key). To our knowledge, so fa...
Aruna Ambalavanan, Rajarathnam Chandramouli
DEON
2008
Springer
15 years 1 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
BC
2004
98views more  BC 2004»
14 years 11 months ago
A stochastic model for the detection of coherent motion
A computational model is presented for the detection of coherent motion based on template matching and hidden Markov models. The premise of this approach is that the growth in dete...
Jason Lee, Willy Wong
100
Voted
ACSAC
2009
IEEE
15 years 6 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
ISSA
2004
15 years 1 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha