Sciweavers

70 search results - page 12 / 14
» An intelligent PE-malware detection system based on associat...
Sort
View
CEAS
2008
Springer
13 years 9 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
CVIU
2007
174views more  CVIU 2007»
13 years 7 months ago
Laser-based detection and tracking of multiple people in crowds
Laser-based people tracking systems have been developed for mobile robotic, and intelligent surveillance areas. Existing systems rely on laser point clustering method to extract o...
Jinshi Cui, Hongbin Zha, Huijing Zhao, Ryosuke Shi...
INCDM
2009
Springer
131views Data Mining» more  INCDM 2009»
14 years 2 months ago
Computer-Aided Diagnosis in Brain Computed Tomography Screening
Currently, interpretation of medical images is almost exclusively made by specialized physicians. Although, the next decades will most certainly be of change and computer-aided dia...
Hugo Peixoto, Victor Alves
CIMCA
2005
IEEE
14 years 1 months ago
Improving Rule Generation Precision for Domain Knowledge based Wrappers
Wrappers play an important role in extracting specified information from various sources. Wrapper rules by which information is extracted are often created from the domain-specifi...
Chang-Hoo Jeong, Sung-Jin Jhun, Myung-Eun Lim, Sun...