Sciweavers

272 search results - page 26 / 55
» A flow based approach for SSH traffic detection
Sort
View
PSIVT
2009
Springer
252views Multimedia» more  PSIVT 2009»
14 years 1 months ago
Moving Object Segmentation Using Optical Flow and Depth Information
This paper discusses the detection of moving objects (being a crucial part of driver assistance systems) using monocular or stereoscopic computer vision. In both cases, object dete...
Jens Klappstein, Tobi Vaudrey, Clemens Rabe, Andre...
RV
2010
Springer
177views Hardware» more  RV 2010»
13 years 7 months ago
Runtime Instrumentation for Precise Flow-Sensitive Type Analysis
We describe a combination of runtime information and static analysis for checking properties of complex and configurable systems. The basic idea of our approach is to 1) let the p...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
INFOCOM
2005
IEEE
14 years 2 months ago
A study of analyzing network traffic as images in real-time
—This paper presents NetViewer, a network measurement approach that can simultaneously detect, identify and visualize attacks and anomalous traffic in real-time by passively moni...
Seong Soo Kim, A. L. Narasimha Reddy
TCSV
2008
139views more  TCSV 2008»
13 years 8 months ago
Trajectory-Based Anomalous Event Detection
Abstract--During the last years, the task of automatic event analysis in video sequences has gained an increasing attention among the research community. The application domains ar...
Claudio Piciarelli, Christian Micheloni, Gian Luca...
BPSC
2009
190views Business» more  BPSC 2009»
13 years 10 months ago
Detective Information Flow Analysis for Business Processes
Abstract: We report on ongoing work towards a posteriori detection of illegal information flows for business processes, focusing on the challenges involved in doing so. Resembling ...
Rafael Accorsi, Claus Wonnemann