Sciweavers

214 search results - page 28 / 43
» The Feature Selection and Intrusion Detection Problems
Sort
View
SIGMOD
2006
ACM
150views Database» more  SIGMOD 2006»
15 years 9 months ago
On-the-fly sharing for streamed aggregation
Data streaming systems are becoming essential for monitoring applications such as financial analysis and network intrusion detection. These systems often have to process many simi...
Sailesh Krishnamurthy, Chung Wu, Michael J. Frankl...
83
Voted
SIGCOMM
2010
ACM
14 years 9 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
PCM
2004
Springer
107views Multimedia» more  PCM 2004»
15 years 3 months ago
Automatic Peak Number Detection in Image Symmetry Analysis
Abstract. In repeated pattern analysis, peak number detection in autocorrelation is of key importance, which subsequently determines the correctness of the constructed lattice. Pre...
Jingrui He, Mingjing Li, HongJiang Zhang, Hanghang...
DAS
2010
Springer
14 years 8 months ago
Automatic unsupervised parameter selection for character segmentation
A major difficulty for designing a document image segmentation methodology is the proper value selection for all involved parameters. This is usually done after experimentations o...
Georgios Vamvakas, Nikolaos Stamatopoulos, Basilio...
DSP
2006
14 years 9 months ago
Detection of audio covert channels using statistical footprints of hidden messages
We address the problem of detecting the presence of hidden messages in audio. The detector is based on the characteristics of the denoised residuals of the audio file, which may c...
Hamza Özer, Bülent Sankur, Nasir D. Memo...