Sciweavers

457 search results - page 22 / 92
» A Multiple Model Cost-Sensitive Approach for Intrusion Detec...
Sort
View
CIA
2008
Springer
13 years 8 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
ACSAC
2004
IEEE
13 years 10 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
CVPR
2006
IEEE
14 years 8 months ago
Fusion of Detection and Matching Based Approaches for Laser Based Multiple People Tracking
Most of visual tracking algorithms have been achieved by matching-based searching strategies or detection-based data association algorithms. In this paper, our objective is to ana...
Jinshi Cui, Huijing Zhao, Ryosuke Shibasaki
BMCBI
2006
126views more  BMCBI 2006»
13 years 6 months ago
A minimally invasive multiple marker approach allows highly efficient detection of meningioma tumors
Background: The development of effective frameworks that permit an accurate diagnosis of tumors, especially in their early stages, remains a grand challenge in the field of bioinf...
Andreas Keller, Nicole Ludwig, Nicole Comtesse, An...
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 7 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik