Sciweavers

776 search results - page 85 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
CCS
2008
ACM
15 years 6 months ago
Efficiently tracking application interactions using lightweight virtualization
In this paper, we propose a general-purpose framework that harnesses the power of lightweight virtualization to track applications interactions in a scalable an efficient manner. ...
Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil ...
ICIP
2005
IEEE
16 years 6 months ago
Trainable post-processing method to reduce false alarms in the detection of small blotches of archive films
We have developed a new semi-automatic neural network based method to detect blotches with low false alarm rate on archive films. Blotches can be modeled as temporal intensity disc...
Attila Licsár, László Cz&uacu...
STORAGESS
2005
ACM
15 years 9 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
IAAI
2003
15 years 5 months ago
CriterionSM Online Essay Evaluation: An Application for Automated Evaluation of Student Essays
This paper describes a deployed educational technology application: the CriterionSM Online Essay Evaluation Service, a web-based system that provides automated scoring and evaluat...
Jill Burstein, Martin Chodorow, Claudia Leacock
VIZSEC
2004
Springer
15 years 9 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah