Sciweavers

103 search results - page 12 / 21
» Anomaly Detection through Registration
Sort
View
JIIS
1998
97views more  JIIS 1998»
13 years 6 months ago
Knowledge Mining With VxInsight: Discovery Through Interaction
The explosive growth in the availability of information is overwhelming traditional information management systems. Although individual pieces of information have become easy to ...
George S. Davidson, Bruce Hendrickson, David K. Jo...
JSAC
2006
95views more  JSAC 2006»
13 years 6 months ago
Impact of Packet Sampling on Portscan Detection
Abstract-- Packet sampling is commonly deployed in highspeed backbone routers to minimize resources used for network monitoring. It is known that packet sampling distorts traffic s...
Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hu...
ACSAC
2005
IEEE
14 years 10 days ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
ISMAR
2007
IEEE
14 years 1 months ago
Precise Geometric Registration by Blur Estimation for Vision-based Augmented Reality
This paper proposes an accurate geometric registration method by estimating blur effects from a degraded image with image markers for augmented reality. A small and inexpensive ca...
Bunyo Okumura, Masayuki Kanbara, Naokazu Yokoya
ACSAC
2003
IEEE
14 years 17 hour ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...