Sciweavers

272 search results - page 20 / 55
» A flow based approach for SSH traffic detection
Sort
View
GCC
2005
Springer
14 years 1 months ago
A Worm Behavioral Approach to Susceptible Host Detection
A new detection approach based on worm behaviors for IDS anti-worm is presented. By the method, the susceptible hosts probed by worms can be detected, and then an immediate counter...
BaiLing Wang, Binxing Fang, Xiao-chun Yun
ICPR
2000
IEEE
14 years 5 hour ago
Moving Shadow and Object Detection in Traffic Scenes
We present an algorithm for segmentation of traffic scenes that distinguishes moving objects from cast shadows. Three image features at each pixel site are considered: brightness,...
Ivana Mikic, Pamela C. Cosman, Greg T. Kogut, Moha...
SIGCOMM
2010
ACM
13 years 7 months ago
Automating root-cause analysis of network anomalies using frequent itemset mining
Finding the root-cause of a network security anomaly is essential for network operators. In our recent work [1, 5], we introduced a generic technique that uses frequent itemset mi...
Ignasi Paredes-Oliva, Xenofontas A. Dimitropoulos,...
IJCV
1998
98views more  IJCV 1998»
13 years 7 months ago
Exploiting Discontinuities in Optical Flow
Most optical flow estimation techniques have substantial difficulties dealing with flow discontinuities. Methods which simultaneously detect flow boundaries and use the detect...
William B. Thompson
IWIA
2003
IEEE
14 years 26 days ago
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
1 A new method for detecting anomalies in the usage of protocols in computer networks is presented in this work. The proposed methodology is applied to TCP and disposed in two step...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...