Sciweavers

588 search results - page 76 / 118
» Activity rhythm detection and modeling
Sort
View
NEUROSCIENCE
2001
Springer
14 years 2 months ago
Recurrent Long-Range Interactions in Early Vision
Abstract. A general principle of cortical architecture is the bidirectional flow of information along feedforward and feedback connections. In the feedforward path, converging con...
Thorsten Hansen, Wolfgang Sepp, Heiko Neumann
CCS
2003
ACM
14 years 3 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
WWW
2011
ACM
13 years 5 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
TMI
2002
191views more  TMI 2002»
13 years 9 months ago
Automatic Detection of Abnormalities in Chest Radiographs Using Local Texture Analysis
A fully automatic method is presented to detect abnormalities in frontal chest radiographs which are aggregated into an overall abnormality score. The method is aimed at finding ab...
Bram van Ginneken, Shigehiko Katsuragawa, Bart M. ...
SERSCISA
2009
Springer
14 years 4 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim