Sciweavers

272 search results - page 33 / 55
» A flow based approach for SSH traffic detection
Sort
View
RAID
1999
Springer
14 years 1 months ago
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks
The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Many of these systems suffer ...
Richard Lippmann, Robert K. Cunningham
ICCV
2005
IEEE
14 years 2 months ago
A Model-Based Vehicle Segmentation Method for Tracking
Our goal is to detect and track moving vehicles on a road observed from cameras placed on poles or buildings. Inter-vehicle occlusion is significant under these conditions and tra...
Xuefeng Song, Ramakant Nevatia
JIPS
2010
195views more  JIPS 2010»
13 years 3 months ago
Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques
Abstract--The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools...
Aly M. El-Semary, Mostafa Gadal-Haqq M. Mostafa
ECCV
2000
Springer
14 years 10 months ago
Pedestrian Detection from a Moving Vehicle
Abstract. This paper presents a prototype system for pedestrian detection on-board a moving vehicle. The system uses a generic two-step approach for efficient object detection. In ...
Dariu Gavrila
VISUALIZATION
1998
IEEE
14 years 1 months ago
Selective visualization of vortices in hydrodynamic flows
Vortices are important features in many research and engineering fields. Visualization is an important step in gaining more understanding and control of vortices. Vortex detection...
I. Ari Sadarjoen, Frits H. Post, Bing Ma, David C....