Sciweavers

321 search results - page 6 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
ACMSE
2005
ACM
15 years 3 months ago
Investigating hidden Markov models capabilities in anomaly detection
Hidden Markov Model (HMM) based applications are common in various areas, but the incorporation of HMM's for anomaly detection is still in its infancy. This paper aims at cla...
Shrijit S. Joshi, Vir V. Phoha
WIAMIS
2009
IEEE
15 years 4 months ago
Archive film defect detection based on a hidden Markov model
We propose a novel statistical approach to detect defects in digitized archive film by using temporal information across a number of frames modeled with an HMM. The HMM is traine...
Xiaosong Wang, Majid Mirmehdi
RE
2002
Springer
14 years 9 months ago
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System
Requirements analysis for an Intrusion Detection System (IDS) involves deriving requirements for the IDS from analysis of the intrusion domain. When the IDS is, as here, a collecti...
Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasan...
DMIN
2006
141views Data Mining» more  DMIN 2006»
14 years 10 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
100
Voted
ICPR
2004
IEEE
15 years 10 months ago
Morphology Analysis of Physiological Signals Using Hidden Markov Models
We describe a clustering algorithm based on continuous Hidden Markov Models (HMM) to automatically classify both electrocardiogram (ECG) and intracranial pressure (ICP) beats base...
Daniel Novák, Lenka Lhotská, David C...