Sciweavers

103 search results - page 11 / 21
» Anomaly Detection through Registration
Sort
View
ACMSE
2006
ACM
14 years 21 days ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
RAID
2009
Springer
14 years 1 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
ICIP
2005
IEEE
14 years 8 months ago
Fast 2D model-to-image registration using vanishing points for sports video analysis
This article focuses on the field-to-image registration for TV sports-related image processing through basic geometrical reasoning. We propose a robust automatic line-based method...
Jean-Bernard Hayet, Justus H. Piater, Jacques G. V...
ISBI
2006
IEEE
14 years 7 months ago
Bayesian registration for anatomical landmark detection
In order to perform medical image registration, landmarks are used to settle correspondences between images. A landmark is a voxel in the image that corresponds to a well-defined ...
Camille Izard, Bruno Jedynak
TMA
2010
Springer
140views Management» more  TMA 2010»
13 years 4 months ago
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory
Abstract. Network traffic classification and anomaly detection have received much attention in the last few years. However, due to the the lack of common ground truth, proposed met...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...