Sciweavers

139 search results - page 10 / 28
» Wireless Intrusion Detection Using Tracking Verification
Sort
View
FTDCS
2004
IEEE
15 years 1 months ago
Friendly Object Tracking and Foreign Object Detection and Localization with an SDAC Wireless Sensor Network
This paper presents a proof-of-concept wireless sensor network for detecting and tracking friendly objects and detecting and localizing foreign objects. The network incorporates a...
Douglas Stark, Jesse Davis
RAID
1999
Springer
15 years 2 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield
ICPR
2008
IEEE
15 years 4 months ago
A new edge-based text verification approach for video
In this paper, we propose a new edge-based text verification approach for video. Based on the investigation of the relation between candidate blocks and their neighbor areas, the ...
Jing Zhang, Dmitry B. Goldgof, Rangachar Kasturi
GPC
2007
Springer
15 years 1 months ago
Image Streaming and Recognition for Vehicle Location Tracking Using Mobile Devices
The image of a license plate is scanned by the camera attached to a mobile PDA device and the numbers on the plate are detected by the image processing parts in the proposed Mobile...
Jin-Suk Kang, Taikyeong T. Jeong, Sang Hyun Oh, Me...
NDSS
2005
IEEE
15 years 3 months ago
Enriching Intrusion Alerts Through Multi-Host Causality
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lu...