Sciweavers

1216 search results - page 110 / 244
» Anomaly Detection Using an Ensemble of Feature Models
Sort
View
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
ICIW
2009
IEEE
14 years 2 months ago
SS-IDS: Statistical Signature Based IDS
Security of web servers has become a sensitive subject today. Prediction of normal and abnormal request is problematic due to large number of false alarms in many anomaly based In...
Payas Gupta, Chedy Raïssi, Gérard Dray...
ICPR
2010
IEEE
13 years 8 months ago
The Binormal Assumption on Precision-Recall Curves
—The precision-recall curve (PRC) has become a widespread conceptual basis for assessing classification performance. The curve relates the positive predictive value of a classi...
Kay Henning Brodersen, Cheng Soon Ong, Klaas Enno ...
TIP
2010
312views more  TIP 2010»
13 years 6 months ago
A Novel Multiresolution Spatiotemporal Saliency Detection Model and Its Applications in Image and Video Compression
—Salient areas in natural scenes are generally regarded as areas which the human eye will typically focus on, and finding these areas is the key step in object detection. In com...
Chenlei Guo, Liming Zhang
ICCV
2005
IEEE
14 years 1 months ago
Learning Hierarchical Models of Scenes, Objects, and Parts
We describe a hierarchical probabilistic model for the detection and recognition of objects in cluttered, natural scenes. The model is based on a set of parts which describe the e...
Erik B. Sudderth, Antonio B. Torralba, William T. ...