Sciweavers

345 search results - page 29 / 69
» Using Active Learning in Intrusion Detection
Sort
View
WORM
2004
15 years 3 days ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu
IJCNN
2008
IEEE
15 years 5 months ago
Adaptive curiosity for emotions detection in speech
— Exploratory activities seem to be crucial for our cognitive development. According to psychologists, exploration is an intrinsically rewarding behaviour. The developmental robo...
Alexis Bondu, Vincent Lemaire
ICPR
2004
IEEE
15 years 12 months ago
Activity Summarisation and Fall Detection in a Supportive Home Environment
Automatic semantic summarisation of human activity and detection of unusual inactivity are useful goals for a vision system operating in a supportive home environment. Learned mod...
Hammadi Nait-Charif, Stephen J. McKenna
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 4 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
CVPR
2011
IEEE
14 years 7 months ago
Learning to Recognize Objects in Egocentric Activities
This paper addresses the problem of learning object models from egocentric video of household activities, using extremely weak supervision. For each activity sequence, we know onl...
Alireza Fathi, Xiaofeng Ren, James Rehg