Sciweavers

587 search results - page 45 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
CCIA
2007
Springer
14 years 4 months ago
Mendelian error detection in complex pedigrees using weighted constraint satisfaction techniques
With the arrival of high throughput genotyping techniques, the detection of likely genotyping errors is becoming an increasingly important problem. In this paper we are interested...
Martí Sánchez, Simon de Givry, Thoma...
IAT
2007
IEEE
14 years 4 months ago
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods
Phishing attack is a kind of identity theft which tries to steal confidential data like on-line bank account information. In a phishing attack scenario, attacker deceives users by...
Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bid...
IMC
2006
ACM
14 years 4 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...
EOR
2008
90views more  EOR 2008»
13 years 10 months ago
Quality of service statistics over heterogeneous networks: Analysis and applications
Heterogeneous wireless/wired networks and ubiquitous environments are gaining ever more attention by research community. To properly control and manage such puzzles a deep knowled...
Alessio Botta, Antonio Pescapè, Giorgio Ven...
ICIP
2005
IEEE
14 years 12 months ago
Aircraft detection and tracking using intelligent cameras
Systems that provide ground movement management at airports, maintaining ground safety and increasing air traffic capacity, are called A-SMGCS (Advanced Surface Movement Guidance a...
Kosmas Dimitropoulos, Nikos Grammalidis, Dimitrios...