Sciweavers

502 search results - page 22 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
ICDM
2008
IEEE
126views Data Mining» more  ICDM 2008»
14 years 3 months ago
Detecting Suspicious Behavior in Surveillance Images
We introduce a novel technique to detect anomalies in images. The notion of normalcy is given by a baseline of images, under the assumption that the majority of such images is nor...
Daniel Barbará, Carlotta Domeniconi, Zoran ...
ICAC
2008
IEEE
14 years 3 months ago
Clustering Analysis for the Management of Self-Monitoring Device Networks
Abstract— The increasing computing and communication capabilities of multi-function devices (MFDs) have enabled networks of such devices to provide value-added services. This has...
Andres Quiroz, Manish Parashar, Nathan Gnanasamban...
KDD
2001
ACM
1203views Data Mining» more  KDD 2001»
14 years 9 months ago
Application of Data Mining Techniques for Medical Image Classification
Breast cancer represents the second leading cause of cancer deaths in women today and it is the most common type of cancer in women. This paper presents some experiments for tumou...
Maria-Luiza Antonie, Osmar R. Zaïane, Alexand...
NDSS
2005
IEEE
14 years 2 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
CEEMAS
2007
Springer
14 years 3 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...