Sciweavers

121 search results - page 17 / 25
» Anomalous trajectory patterns detection
Sort
View
HICSS
2009
IEEE
95views Biometrics» more  HICSS 2009»
14 years 2 months ago
Intrusion Monitoring in Process Control Systems
To protect process control networks from cyber intrusions, preventive security measures such as perimeter defenses (for example, network firewalls and demilitarized zones) and se...
Alfonso Valdes, Steven Cheung
DSN
2006
IEEE
14 years 1 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
TEC
2002
166views more  TEC 2002»
13 years 7 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
CSB
2005
IEEE
206views Bioinformatics» more  CSB 2005»
14 years 1 months ago
Bioinformatic Insights from Metagenomics through Visualization
Cutting-edge biological and bioinformatics research seeks a systems perspective through the analysis of multiple types of high-throughput and other experimental data for the same ...
Susan L. Havre, Bobbie-Jo M. Webb-Robertson, Anuj ...
CVPR
2010
IEEE
13 years 8 months ago
Scene understanding by statistical modeling of motion patterns
We present a novel method for the discovery and statistical representation of motion patterns in a scene observed by a static camera. Related methods involving learning of pattern...
Imran Saleemi, Lance Hartung, Mubarak Shah