Sciweavers

531 search results - page 57 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
ECCV
2008
Springer
16 years 3 months ago
Multi-camera Tracking and Atypical Motion Detection with Behavioral Maps
Abstract. We introduce a novel behavioral model to describe pedestrians motions, which is able to capture sophisticated motion patterns resulting from the mixture of different cate...
Jérôme Berclaz, François Fleur...
KDD
2007
ACM
132views Data Mining» more  KDD 2007»
16 years 1 months ago
LungCAD: a clinically approved, machine learning system for lung cancer detection
We present LungCAD, a computer aided diagnosis (CAD) system that employs a classification algorithm for detecting solid pulmonary nodules from CT thorax studies. We briefly descri...
R. Bharat Rao, Jinbo Bi, Glenn Fung, Marcos Salgan...
CCS
2007
ACM
15 years 5 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
ICANN
2005
Springer
15 years 7 months ago
Learning Features of Intermediate Complexity for the Recognition of Biological Motion
Humans can recognize biological motion from strongly impoverished stimuli, like point-light displays. Although the neural mechanism underlying this robust perceptual process have n...
Rodrigo Sigala, Thomas Serre, Tomaso Poggio, Marti...
EUROSYS
2008
ACM
15 years 10 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos