Sciweavers

345 search results - page 42 / 69
» Using Active Learning in Intrusion Detection
Sort
View
EUROSYS
2008
ACM
15 years 7 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
DSP
2006
14 years 10 months ago
Adaptive multi-modality sensor scheduling for detection and tracking of smart targets
This paper considers the problem of sensor scheduling for the purposes of detection and tracking of "smart" targets. Smart targets are targets that can detect when they ...
Christopher M. Kreucher, Doron Blatt, Alfred O. He...
FGR
2008
IEEE
176views Biometrics» more  FGR 2008»
15 years 5 months ago
Learning image alignment without local minima for face detection and tracking
Active Appearance Models (AAMs) have been extensively used for face alignment during the last 20 years. While AAMs have numerous advantages relative to alternate approaches, they ...
Minh Hoai Nguyen, Fernando De la Torre
DSN
2009
IEEE
15 years 5 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
CCS
2004
ACM
15 years 4 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash