Sciweavers

531 search results - page 52 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
ICIP
2002
IEEE
16 years 3 months ago
Region-based retrieval: coarse segmentation with fine color signature
The two major problems raised by a region-based image retrieval system are the automatic definition and description of regions. In this paper we first present a technique of unsup...
Julien Fauqueur, Nozha Boujemaa
CCR
2006
136views more  CCR 2006»
15 years 1 months ago
Traffic classification on the fly
The early detection of applications associated with TCP flows is an essential step for network security and traffic engineering. The classic way to identify flows, i.e. looking at...
Laurent Bernaille, Renata Teixeira, Ismael Akodken...
WORM
2003
15 years 2 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
JMM2
2008
92views more  JMM2 2008»
15 years 1 months ago
Dimensionality Reduction using SOM based Technique for Face Recognition
Unsupervised or Self-Organized learning algorithms have become very popular for discovery of significant patterns or features in the input data. The three prominent algorithms name...
Dinesh Kumar, C. S. Rai, Shakti Kumar
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 5 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes