Sciweavers

531 search results - page 64 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
ACSAC
1998
IEEE
15 years 5 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
ML
1998
ACM
113views Machine Learning» more  ML 1998»
15 years 1 months ago
Machine Learning for the Detection of Oil Spills in Satellite Radar Images
During a project examining the use of machine learning techniques for oil spill detection, we have encountered several essential questions that we believe deserve the attention of ...
Miroslav Kubat, Robert C. Holte, Stan Matwin
SECURWARE
2007
IEEE
15 years 7 months ago
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
A Man-in-the-Middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing...
Jorge Belenguer, Carlos Miguel Tavares Calafate
CVPR
2009
IEEE
15 years 8 months ago
Automatic fetal face detection from ultrasound volumes via learning 3D and 2D information
3D ultrasound imaging has been increasingly used in clinics for fetal examination. However, manually searching for the optimal view of the fetal face in 3D ultrasound volumes is c...
Shaolei Feng, Shaohua Kevin Zhou, Sara Good, Dorin...
111
Voted
PAMI
1998
113views more  PAMI 1998»
15 years 1 months ago
Example-Based Learning for View-Based Human Face Detection
—We present an example-based learning approach for locating vertical frontal views of human faces in complex scenes. The technique models the distribution of human face patterns ...
Kah Kay Sung, Tomaso Poggio