Sciweavers

531 search results - page 88 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
3DPVT
2006
IEEE
247views Visualization» more  3DPVT 2006»
15 years 3 months ago
Contour-Based Object Detection in Range Images
This paper presents a novel object recognition approach based on range images. Due to its insensitivity to illumination, range data is well suited for reliable silhouette extracti...
Stefan Stiene, Kai Lingemann, Andreas Nüchter...
IJNSEC
2008
95views more  IJNSEC 2008»
14 years 11 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
ANCS
2007
ACM
15 years 3 months ago
An improved algorithm to accelerate regular expression evaluation
Modern network intrusion detection systems need to perform regular expression matching at line rate in order to detect the occurrence of critical patterns in packet payloads. Whil...
Michela Becchi, Patrick Crowley
CHI
2010
ACM
15 years 6 months ago
Scale detection for a priori gesture recognition
Gesture-based interfaces provide expert users with an efficient form of interaction but they require a learning effort for novice users. To address this problem, some on-line gui...
Caroline Appert, Olivier Bau
INFOCOM
2009
IEEE
15 years 6 months ago
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks
—A major threat to data networks is based on the fact that some traffic can be expensive to classify and filter as it will undergo a longer than average list of filtering rule...
Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Bou...