Sciweavers

126 search results - page 24 / 26
» A Probabilistic Method for Detecting Anomalous Program Behav...
Sort
View
CVIU
2006
162views more  CVIU 2006»
13 years 7 months ago
Unsupervised scene analysis: A hidden Markov model approach
This paper presents a new approach to scene analysis, which aims at extracting structured information from a video sequence using directly low-level data. The method models the se...
Manuele Bicego, Marco Cristani, Vittorio Murino
PEPM
2010
ACM
14 years 4 months ago
Context-sensitive analysis of obfuscated x86 executables
A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipul...
Arun Lakhotia, Davidson R. Boccardo, Anshuman Sing...
ICAI
2004
13 years 8 months ago
Using Fuzzy Clustering for Real-time Space Flight Safety
To ensure space flight safety, it is necessary to monitor myriad sensor readings on the ground and in flight. Since a space shuttle has many sensors, monitoring data and drawing c...
Charles Lee, Darrin M. Hanna, Richard E. Haskell, ...
ICTAI
2007
IEEE
14 years 1 months ago
An Adaptive Distributed Ensemble Approach to Mine Concept-Drifting Data Streams
An adaptive boosting ensemble algorithm for classifying homogeneous distributed data streams is presented. The method builds an ensemble of classifiers by using Genetic Programmi...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 7 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti