Sciweavers

123 search results - page 12 / 25
» A network intrusion detection method using independent compo...
Sort
View
BMCBI
2006
150views more  BMCBI 2006»
13 years 7 months ago
Protein structure similarity from principle component correlation analysis
Background: Owing to rapid expansion of protein structure databases in recent years, methods of structure comparison are becoming increasingly effective and important in revealing...
Xiaobo Zhou, James Chou, Stephen T. C. Wong
AINA
2009
IEEE
14 years 2 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
ICIP
2001
IEEE
14 years 9 months ago
Face detection from cluttered images using a polynomial neural network
In this paper, we propose a new method for face detection from cluttered images. We use a polynomial neural network (PNN) for separation of face and non-face patterns while the co...
Lin-Lin Huang, Akinobu Shimizu, Yoshihiro Hagihara...
CCS
2007
ACM
13 years 11 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
GLOBECOM
2007
IEEE
14 years 1 months ago
Wavelet Based Detection of Shadow Fading in Wireless Networks
— In wireless communications, shadow fading can cause at least 6 dB power loss for 10% of the time [1]. Early detection of shadow fading plays an important part in facilitating t...
Xiaobo Long, Biplab Sikdar