Sciweavers

1216 search results - page 73 / 244
» Anomaly Detection Using an Ensemble of Feature Models
Sort
View
142
Voted
ICC
2009
IEEE
125views Communications» more  ICC 2009»
15 years 16 days ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto
121
Voted
ICCV
2005
IEEE
15 years 8 months ago
Visual Speech Recognition with Loosely Synchronized Feature Streams
We present an approach to detecting and recognizing spoken isolated phrases based solely on visual input. We adopt an architecture that first employs discriminative detection of ...
Kate Saenko, Karen Livescu, Michael Siracusa, Kevi...
129
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
141
Voted
TCSV
2008
291views more  TCSV 2008»
15 years 2 months ago
A Statistical Video Content Recognition Method Using Invariant Features on Object Trajectories
Abstract--This work is dedicated to a statistical trajectorybased approach addressing two issues related to dynamic video content understanding: recognition of events and detection...
Alexandre Hervieu, Patrick Bouthemy, Jean-Pierre L...
157
Voted
CIVR
2008
Springer
271views Image Analysis» more  CIVR 2008»
15 years 4 months ago
Multiple feature fusion by subspace learning
Since the emergence of extensive multimedia data, feature fusion has been more and more important for image and video retrieval, indexing and annotation. Existing feature fusion t...
Yun Fu, Liangliang Cao, Guodong Guo, Thomas S. Hua...