Sciweavers

321 search results - page 44 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
FLAIRS
2003
15 years 1 months ago
Orthographic Case Restoration Using Supervised Learning Without Manual Annotation
One challenge in text processing is the treatment of case insensitive documents such as speech recognition results. The traditional approach is to re-train a language model exclud...
Cheng Niu, Wei Li 0003, Jihong Ding, Rohini K. Sri...
WISEC
2010
ACM
15 years 6 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
WSC
2007
15 years 2 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
ICC
2009
IEEE
125views Communications» more  ICC 2009»
14 years 9 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
CGF
2008
125views more  CGF 2008»
14 years 11 months ago
Sparse points matching by combining 3D mesh saliency with statistical descriptors
This paper proposes new methodology for the detection and matching of salient points over several views of an object. The process is composed by three main phases. In the first st...
Umberto Castellani, Marco Cristani, Simone Fantoni...