Sciweavers

345 search results - page 27 / 69
» Using Active Learning in Intrusion Detection
Sort
View
ICEIS
2008
IEEE
15 years 5 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
DIM
2009
ACM
15 years 3 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
139
Voted
TSMC
2008
167views more  TSMC 2008»
14 years 10 months ago
A Human-Computer Interface Using Symmetry Between Eyes to Detect Gaze Direction
In the cases of paralysis so severe that a person's ability to control movement is limited to the muscles around the eyes, eye movements or blinks are the only way for the per...
John J. Magee, Margrit Betke, James Gips, M. R. Sc...
HAIS
2010
Springer
15 years 3 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
162
Voted
ICCV
2009
IEEE
16 years 3 months ago
Modelling Activity Global Temporal Dependencies using Time Delayed Probabilistic Graphical Model
We present a novel approach for detecting global behaviour anomalies in multiple disjoint cameras by learning time delayed dependencies between activities cross camera views. Sp...
Chen Change Loy, Tao Xiang and Shaogang Gong