Sciweavers

531 search results - page 67 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
CIT
2004
Springer
15 years 7 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
CVPR
2007
IEEE
16 years 3 months ago
Towards Scalable Representations of Object Categories: Learning a Hierarchy of Parts
This paper proposes a novel approach to constructing a hierarchical representation of visual input that aims to enable recognition and detection of a large number of object catego...
Sanja Fidler, Ales Leonardis
LREC
2008
193views Education» more  LREC 2008»
15 years 2 months ago
Eksairesis: A Domain-Adaptable System for Ontology Building from Unstructured Text
This paper describes Eksairesis, a system for learning economic domain knowledge automatically from Modern Greek text. The knowledge is in the form of economic terms and the seman...
Katia Kermanidis, Aristomenis Thanopoulos, Manolis...
SIGMOD
2006
ACM
150views Database» more  SIGMOD 2006»
16 years 1 months ago
On-the-fly sharing for streamed aggregation
Data streaming systems are becoming essential for monitoring applications such as financial analysis and network intrusion detection. These systems often have to process many simi...
Sailesh Krishnamurthy, Chung Wu, Michael J. Frankl...
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 1 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof