Sciweavers

531 search results - page 74 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
AROBOTS
2010
128views more  AROBOTS 2010»
15 years 1 months ago
Track-based self-supervised classification of dynamic obstacles
Abstract This work introduces a self-supervised architecture for robust classification of moving obstacles in urban environments. Our approach presents a hierarchical scheme that r...
Roman Katz, Juan Nieto, Eduardo Mario Nebot, Bertr...
GI
2007
Springer
15 years 7 months ago
Background Modeling Using Adaptive Cluster Density Estimation for Automatic Human Detection
: Detection is an inherent part of every advanced automatic tracking system. In this work we focus on automatic detection of humans by enhanced background subtraction. Background s...
Harish Bhaskar, Lyudmila Mihaylova, Simon Maskell
JMLR
2010
185views more  JMLR 2010»
14 years 8 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
104
Voted
PAM
2007
Springer
15 years 7 months ago
Leveraging BitTorrent for End Host Measurements
Traditional methods of conducting measurements to end hosts require sending unexpected packets to measurement targets. Although existing techniques can ascertain end host character...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...
HOTI
2008
IEEE
15 years 8 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani