Sciweavers

321 search results - page 21 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
86
Voted
CSL
1999
Springer
14 years 11 months ago
A hidden Markov-model-based trainable speech synthesizer
This paper presents a new approach to speech synthesis in which a set of cross-word decision-tree state-clustered context-dependent hidden Markov models are used to define a set o...
R. E. Donovan, Philip C. Woodland
CORR
2010
Springer
136views Education» more  CORR 2010»
14 years 9 months ago
The Highest Expected Reward Decoding for HMMs with Application to Recombination Detection
Abstract. Hidden Markov models are traditionally decoded by the Viterbi algorithm which finds the highest probability state path in the model. In recent years, several limitations ...
Michal Nánási, Tomás Vinar, B...
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
SPIN
2009
Springer
15 years 6 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
ICPR
2006
IEEE
16 years 23 days ago
A Combined Bayesian Markovian Approach for Behaviour Recognition
Numerous techniques exist which can be used for the task of behavioural analysis and recognition. Common amongst these are Bayesian networks and Hidden Markov Models. Although the...
David Paul Young, James M. Ferryman, Nicholas L. C...