Sciweavers

345 search results - page 33 / 69
» Using Active Learning in Intrusion Detection
Sort
View
110
Voted
ISMIS
2005
Springer
15 years 6 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
114
Voted
ICCV
2009
IEEE
16 years 5 months ago
Active Skeleton for Non-rigid Object Detection
We present a shape-based algorithm for detecting and recognizing non-rigid objects from natural images. The existing literature in this domain often cannot model the objects ver...
Xiang Bai, Xinggang Wang, Longin Jan Latecki, Weny...
109
Voted
ICML
2010
IEEE
15 years 21 days ago
Application of Machine Learning To Epileptic Seizure Detection
We present and evaluate a machine learning approach to constructing patient-specific classifiers that detect the onset of an epileptic seizure through analysis of the scalp EEG, a...
Ali H. Shoeb, John V. Guttag
113
Voted
CVPR
2009
IEEE
16 years 7 months ago
Observe Locally, Infer Globally: a Space-Time MRF for Detecting Abnormal Activities with Incremental Updates
We propose a space-time Markov Random Field (MRF) model to detect abnormal activities in video. The nodes in the MRF graph correspond to a grid of local regions in the video fra...
Jaechul Kim (University of Texas at Austin), Krist...
128
Voted
CORR
2010
Springer
175views Education» more  CORR 2010»
15 years 18 days ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan